Security auditing of web security vulnerabilities using program analysis : mobile application recommendation

Security Auditing of Web Security Vulnerabilities using Program Analysis - The rate of evolution in the world of technology and the internet is increasing at an overwhelming rate in recent years. Today, people rely on the internet for various reasons. The main usage of the internet is to help peop...

Full description

Saved in:
Bibliographic Details
Main Author: Yong, Chen Feng
Other Authors: Liu Yang
Format: Final Year Project
Language:English
Published: 2019
Subjects:
Online Access:http://hdl.handle.net/10356/76988
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-76988
record_format dspace
spelling sg-ntu-dr.10356-769882023-03-03T20:42:52Z Security auditing of web security vulnerabilities using program analysis : mobile application recommendation Yong, Chen Feng Liu Yang School of Computer Science and Engineering DRNTU::Engineering::Computer science and engineering Security Auditing of Web Security Vulnerabilities using Program Analysis - The rate of evolution in the world of technology and the internet is increasing at an overwhelming rate in recent years. Today, people rely on the internet for various reasons. The main usage of the internet is to help people to connect and communicate with one another in the different sector of the world through the means of web applications [1]. As technology and the internet evolve, cybersecurity concerns have also been on the rise as hacker probe into the vulnerabilities due to the fast-evolving technology. Mobile Application Recommendation - Smartphone has now become part and parcel of human being’s life. Mobile applications are created by developers to aid smartphone users in improving their daily lives. Mobile applications can be classified according to their categories such as finance, social, tools, and many others. In each of the different categories, there are many applications with similar features and functionalities. However, although applications may have similar features and functionalities, each application has its pros and cons as compared to each other. As such, users of mobile applications may have difficulty finding similar functionality application that suits their needs. Bachelor of Engineering (Computer Science) 2019-04-29T13:20:26Z 2019-04-29T13:20:26Z 2019 Final Year Project (FYP) http://hdl.handle.net/10356/76988 en Nanyang Technological University 25 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering
spellingShingle DRNTU::Engineering::Computer science and engineering
Yong, Chen Feng
Security auditing of web security vulnerabilities using program analysis : mobile application recommendation
description Security Auditing of Web Security Vulnerabilities using Program Analysis - The rate of evolution in the world of technology and the internet is increasing at an overwhelming rate in recent years. Today, people rely on the internet for various reasons. The main usage of the internet is to help people to connect and communicate with one another in the different sector of the world through the means of web applications [1]. As technology and the internet evolve, cybersecurity concerns have also been on the rise as hacker probe into the vulnerabilities due to the fast-evolving technology. Mobile Application Recommendation - Smartphone has now become part and parcel of human being’s life. Mobile applications are created by developers to aid smartphone users in improving their daily lives. Mobile applications can be classified according to their categories such as finance, social, tools, and many others. In each of the different categories, there are many applications with similar features and functionalities. However, although applications may have similar features and functionalities, each application has its pros and cons as compared to each other. As such, users of mobile applications may have difficulty finding similar functionality application that suits their needs.
author2 Liu Yang
author_facet Liu Yang
Yong, Chen Feng
format Final Year Project
author Yong, Chen Feng
author_sort Yong, Chen Feng
title Security auditing of web security vulnerabilities using program analysis : mobile application recommendation
title_short Security auditing of web security vulnerabilities using program analysis : mobile application recommendation
title_full Security auditing of web security vulnerabilities using program analysis : mobile application recommendation
title_fullStr Security auditing of web security vulnerabilities using program analysis : mobile application recommendation
title_full_unstemmed Security auditing of web security vulnerabilities using program analysis : mobile application recommendation
title_sort security auditing of web security vulnerabilities using program analysis : mobile application recommendation
publishDate 2019
url http://hdl.handle.net/10356/76988
_version_ 1759854698851991552