Proceedings of the International Conference on Computing Advancements 2020
DOI: 10.1145/3377049.3377107
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Web Application Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Blood vessel formation and stabilization are fundamental components of early stage development, supporting intercellular exchange of nutrients, oxygen, and metabolites for organ formation. The mature vascular network-namely arteries, veins, and capillaries-consists of a complex network of highly regulated vessels that vary in size, volume, strength, and elasticity throughout tissues [1][2][3][4][5] . Across the vascular plexus, the vascular wall is composed of three distinct layers-the tunica intima, composed of endothelial cells, the tunica media composed of mural cells (smooth muscle cells and pericytes), and the tunica adventitia mainly composed of fibroblasts, extracellular matrix and progenitor cells 6 .…”
Section: Introductionmentioning
confidence: 99%
“…Blood vessel formation and stabilization are fundamental components of early stage development, supporting intercellular exchange of nutrients, oxygen, and metabolites for organ formation. The mature vascular network-namely arteries, veins, and capillaries-consists of a complex network of highly regulated vessels that vary in size, volume, strength, and elasticity throughout tissues [1][2][3][4][5] . Across the vascular plexus, the vascular wall is composed of three distinct layers-the tunica intima, composed of endothelial cells, the tunica media composed of mural cells (smooth muscle cells and pericytes), and the tunica adventitia mainly composed of fibroblasts, extracellular matrix and progenitor cells 6 .…”
Section: Introductionmentioning
confidence: 99%
“…These attacks may be classified into several categories, such as: a) Common web attack is a criminal attack that is generally done against web-based applications. The most common are path/directory traversal [2], cross-site scripting (XSS) [3], local file inclusion (LFI) [4], SQL injection (SQLi) [5], and distributed denial of service (DDoS) [6].…”
Section: Introductionmentioning
confidence: 99%
“…These findings underscore the need for further research to explore the drivers of e-commerce performance and customer retention in the online supermarket sector in Indonesia. Some of the relevant studies have been conducted by Huda, Adha, and Pujarama (2019), Ramli et al (2020), andRahman et al (2020) and Although these studies have examined various factors that affect ecommerce performance and customer retention, none of them have focused specifically on the impact of price transparency, online shopping interface, safe transactions, and delivery performance on digital customer retention in the online supermarket industry in Indonesia.…”
Section: Introductionmentioning
confidence: 99%