Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications
نویسندگان
چکیده
1 Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications; Hossain Shahriar, Department of Information Technology, Kennesaw State University, Marietta, Georgia, USA Hisham M. Haddad, Department of Computer Science, Kennesaw State University, Marietta, Georgia, USA David Lebron, Department of Computer Science, Kennesaw State University, Marietta, Georgia, USA Rubana Lupu, Department of Information Technology, Kennesaw State University, Marietta, Georgia, USA
منابع مشابه
Mitigating and Monitoring Program Security Vulnerabilities
Today's programs are implemented in a variety of languages and contain serious vulnerabilities which can be exploited to cause security breaches. These vulnerabilities have been exploited in real life and resulted in damages to related stakeholders such as program users. As most vulnerabilities belong to program code, many techniques have been applied to mitigate vulnerabilities before and afte...
متن کاملDetection and Mitigation of Web Application Vulnerabilities Based on Security Testing
The paper proposes a security testing technique to detect known vulnerabilities of web applications using both static and dynamic analysis. We also present a process to improve the security of web applications by mitigating many of the vulnerabilities revealed in the testing phase, and address a new method for detecting unknown vulnerabilities by applying dynamic black-box testing based on a fu...
متن کاملEvil Pickles: DoS Attacks Based on Object-Graph Engineering (Artifact)
This artefact demonstrates the effects of the serialisation vulnerabilities described in the companion paper. It is composed of three components: scripts, including source code, for Java, Ruby and C# serialisation-vulnerabilities, two case studies that demonstrate attacks based on the vulnerabilities, and a contracts-based mitigation strategy for serialisation-based attacks on Java applications...
متن کاملCompose, reliability and validity of survey of histrionic women's couple vulnerabilities
The purpose of this study is to compose and reliability of a survey about histrionic women's mutual damages in their marital relationship. The method that was used for this survey was a composition of exploratory and combinatory which was done in two steps. The first step was a qualitative factors discovery analysis one which included 17 semi-structured interviews and review of scientific ...
متن کاملانگیزه، دلایل و دانش فراگیران در استفاده از دورههای آزاد درونخطی گسترده (موک)
Aim: One of the latest trends or methods in online education pertains to significant development of MOOCs. Thus, the purpose of the present research is to study the Motivation, Reasons, and Knowledge of learners in the use of MOOCs. Methods: This study was an applied research, which was carried through survey method. the Population of the present research includes all members of electronic dis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJSSE
دوره 7 شماره
صفحات -
تاریخ انتشار 2016