To search, Click below search items.
All Published Papers Search Service
Title
Minimize Web Applications Vulnerabilities through the Early Detection of CRLF Injection
Author
Md. Mijanur Rahman, Md. Asibul Hasan
Vol. 23 No. 2 pp. 199-202
Keywords
Cyber Security, OWASP vulnerabilities, Security Detection, CRLF Injection, Injection Attack
The Status of the Bring Your Own Device (BYOD) in Saudi Arabia: Dataset
Khalid A. Almarhabi, Adel A. Bahaddad, and Ahmed M. Alghamdi
Vol. 23 No. 2 pp. 203-209
Bring Your Own Device (BYOD), Information Management, Saudi Arabia.
Strategic Business Values of the Blockchain Technology Market to Assist Professionals: Deployment Perspective
Waleed Rashideh
Vol. 23 No. 2 pp. 210-226
Blockchain technology; business value; deployment opportunities, technical assessment.
Electronic Questionnaire of Organizational Citizenship, Job Satisfaction and Their Relationship to Performance Quality for Physical Education Teachers in the Western Region - KSA
Hesham Sayed Ahmed Abdalfatah
Vol. 22 No. 2 pp. 227-236
performance quality, organizational citizenship, job satisfaction, KSA