Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications

نویسندگان

  • Hossain Shahriar
  • Hisham M. Haddad
  • David Lebron
  • Rubana Yasmin Lupu
چکیده

1 Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications; Hossain Shahriar, Department of Information Technology, Kennesaw State University, Marietta, Georgia, USA Hisham M. Haddad, Department of Computer Science, Kennesaw State University, Marietta, Georgia, USA David Lebron, Department of Computer Science, Kennesaw State University, Marietta, Georgia, USA Rubana Lupu, Department of Information Technology, Kennesaw State University, Marietta, Georgia, USA

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating and Monitoring Program Security Vulnerabilities

Today's programs are implemented in a variety of languages and contain serious vulnerabilities which can be exploited to cause security breaches. These vulnerabilities have been exploited in real life and resulted in damages to related stakeholders such as program users. As most vulnerabilities belong to program code, many techniques have been applied to mitigate vulnerabilities before and afte...

متن کامل

Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing

The paper proposes a security testing technique to detect known vulnerabilities of web applications using both static and dynamic analysis. We also present a process to improve the security of web applications by mitigating many of the vulnerabilities revealed in the testing phase, and address a new method for detecting unknown vulnerabilities by applying dynamic black-box testing based on a fu...

متن کامل

Evil Pickles: DoS Attacks Based on Object-Graph Engineering (Artifact)

This artefact demonstrates the effects of the serialisation vulnerabilities described in the companion paper. It is composed of three components: scripts, including source code, for Java, Ruby and C# serialisation-vulnerabilities, two case studies that demonstrate attacks based on the vulnerabilities, and a contracts-based mitigation strategy for serialisation-based attacks on Java applications...

متن کامل

Compose, reliability and validity of survey of histrionic women's couple vulnerabilities

  The purpose of this study is to compose and reliability of a survey about histrionic women's mutual damages in their marital relationship. The method that was used for this survey was a composition of exploratory and combinatory which was done in two steps. The first step was a qualitative factors discovery analysis one which included 17 semi-structured interviews and review of scientific ...

متن کامل

انگیزه، دلایل و دانش فراگیران در استفاده از دوره‌های آزاد درون‌خطی گسترده (موک)

Aim: One of the latest trends or methods in online education pertains to significant development of MOOCs. Thus, the purpose of the present research is to study the Motivation, Reasons, and Knowledge of learners in the use of MOOCs. Methods: This study was an applied research, which was carried through survey method. the Population of the present research includes all members of electronic dis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJSSE

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2016