All artifacts related to a systematic mapping study on web API security vulnerabilities and mitigation mechanisms; the data consists of the protocol we followed to perform the review (Protocol.pdf, in spanish), the data fields we extracted from each primary study in the review along with the rationale for their inclusion (Data extraction fields.xlsx), the data extracted from each of them (DataExtraction.xlsx), the quality assessment criteria and results (Quality Asessement.xlsx) and the extracted primary studies during each phase of the filtering process: QuasiGoldPapers.xlsx Replicability initial.xlsx Replicability phase 1.xlsx Replicability phase 2.xlsx Replicability phase 3.xlsx Replicability phase 4.xlsx Replicability final.xl...
Hardly a facet of human life is not influenced by the Internet due to the continuous proliferation i...
New vulnerabilities discovered in a web browser put millions of users at risk, requiring urgent atte...
Throughout this article, you can learn about Web Vulnerability Scanners and general concepts about c...
Since the middle of the last decade the development of web APIs has skyrocketed and their presence h...
In the recent years Information Technology has been under various different threats most of the thre...
El projecte consisteix en una aplicació web que permet analitzar les vulnerabilitats d'altres webs i...
We are in the era where a person needs to interact with Web applications day to day life. As the use...
M.Sc. (Computer Science)Abstract: Web applications have been the target of endless attacks which rea...
Web security has been a concern given how often people access web applications be it for work or lei...
ABSTRACT – Web applications consist of several different and interacting technologies. These interac...
The aim of this work is to obtain the web APIs used in the top 1 000 000 pages of the Tranco ranking...
Estudio de las vunlerabilidades presentes en aplicaiones webEstudi sobre les vulnerabilitats més com...
A security API is an Application Program Interface that allows untrusted code to access sensitive re...
As the number of web applications and the corresponding number and sophistication of the threats inc...
This data package contains supplemental material data for the under review TSE submission: A Socio-t...
Hardly a facet of human life is not influenced by the Internet due to the continuous proliferation i...
New vulnerabilities discovered in a web browser put millions of users at risk, requiring urgent atte...
Throughout this article, you can learn about Web Vulnerability Scanners and general concepts about c...
Since the middle of the last decade the development of web APIs has skyrocketed and their presence h...
In the recent years Information Technology has been under various different threats most of the thre...
El projecte consisteix en una aplicació web que permet analitzar les vulnerabilitats d'altres webs i...
We are in the era where a person needs to interact with Web applications day to day life. As the use...
M.Sc. (Computer Science)Abstract: Web applications have been the target of endless attacks which rea...
Web security has been a concern given how often people access web applications be it for work or lei...
ABSTRACT – Web applications consist of several different and interacting technologies. These interac...
The aim of this work is to obtain the web APIs used in the top 1 000 000 pages of the Tranco ranking...
Estudio de las vunlerabilidades presentes en aplicaiones webEstudi sobre les vulnerabilitats més com...
A security API is an Application Program Interface that allows untrusted code to access sensitive re...
As the number of web applications and the corresponding number and sophistication of the threats inc...
This data package contains supplemental material data for the under review TSE submission: A Socio-t...
Hardly a facet of human life is not influenced by the Internet due to the continuous proliferation i...
New vulnerabilities discovered in a web browser put millions of users at risk, requiring urgent atte...
Throughout this article, you can learn about Web Vulnerability Scanners and general concepts about c...