Please use this identifier to cite or link to this item:
Title: Security auditing of web security vulnerabilities using program analysis : mobile application recommendation
Authors: Yong, Chen Feng
Keywords: DRNTU::Engineering::Computer science and engineering
Issue Date: 2019
Abstract: Security Auditing of Web Security Vulnerabilities using Program Analysis - The rate of evolution in the world of technology and the internet is increasing at an overwhelming rate in recent years. Today, people rely on the internet for various reasons. The main usage of the internet is to help people to connect and communicate with one another in the different sector of the world through the means of web applications [1]. As technology and the internet evolve, cybersecurity concerns have also been on the rise as hacker probe into the vulnerabilities due to the fast-evolving technology. Mobile Application Recommendation - Smartphone has now become part and parcel of human being’s life. Mobile applications are created by developers to aid smartphone users in improving their daily lives. Mobile applications can be classified according to their categories such as finance, social, tools, and many others. In each of the different categories, there are many applications with similar features and functionalities. However, although applications may have similar features and functionalities, each application has its pros and cons as compared to each other. As such, users of mobile applications may have difficulty finding similar functionality application that suits their needs.
Rights: Nanyang Technological University
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
Yong Chen Feng U1620913B Final Year Project Report.pdf
  Restricted Access
Security Audit & Mobile Application Recommendation490.08 kBAdobe PDFView/Open

Page view(s)

Updated on Jun 19, 2021


Updated on Jun 19, 2021

Google ScholarTM


Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.