2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT) 2021
DOI: 10.1109/atit54053.2021.9678541
|View full text |Cite
|
Sign up to set email alerts
|

Web Application Critical Resources Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 14 publications
0
0
0
Order By: Relevance
“…These systems comprise stored data, including student and lecturer profile pages, functionalities for the management of files through downloading and uploading various documents, and virtual learning-relevant forum pages. The present research employs a qualitative and descriptive methodology ( Invicti, 2021 ) based on penetration testing techniques ( Al-Shaer, Spring & Christou, 2020 ; Korniyenko et al, 2021 ; The MITRE Corporation, 2021 ; OWASP, 2021b ; Yosifova, 2021 ) to identify essential vulnerabilities in eLMS in Western Balkan HEIs. The primary objective is to discern critical vulnerabilities within eLMSs in HEIs situated in the Western Balkan region.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…These systems comprise stored data, including student and lecturer profile pages, functionalities for the management of files through downloading and uploading various documents, and virtual learning-relevant forum pages. The present research employs a qualitative and descriptive methodology ( Invicti, 2021 ) based on penetration testing techniques ( Al-Shaer, Spring & Christou, 2020 ; Korniyenko et al, 2021 ; The MITRE Corporation, 2021 ; OWASP, 2021b ; Yosifova, 2021 ) to identify essential vulnerabilities in eLMS in Western Balkan HEIs. The primary objective is to discern critical vulnerabilities within eLMSs in HEIs situated in the Western Balkan region.…”
Section: Resultsmentioning
confidence: 99%
“…The process of penetration testing ( Zakaria et al, 2019 ) involves passive analysis of eLMS for weaknesses, technical flaws, or vulnerabilities. According to MITRE ATT&CK and OWASP ( Al-Shaer, Spring & Christou, 2020 ; Korniyenko et al, 2021 ; Pham & Dang, 2018 ; Zare, Zare & Azadi, 2018 ), the primary purpose of penetration tests is to find more effective attack vectors as well as exploit vulnerabilities.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation