Journal articles on the topic 'OWASP ZAP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'OWASP ZAP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Putra Pura, Calvin Bernandra, Try Yudha Maulana, Aldi Februri, and Tamsir Ariyadi. "Analisis Celah Keamanan Website Menggunakan Tools OWASP ZAP Di Kali Linux." JUSTER : Jurnal Sains dan Terapan 4, no. 1 (2025): 46–51. https://doi.org/10.57218/juster.v4i1.1341.
Full textWenny, Rizca, and Fandi Yulian Pamuji. "Perbandingan Evaluasi Kerentanan Menggunakan Tenable Nessus Scanner dan Owasp Zed Attack Proxy untuk Meningkatkan Keamanan Sistem Informasi Kepegawaian di Universitas Merdeka Malang." Jurnal Ilmiah Universitas Batanghari Jambi 24, no. 3 (2024): 2451. http://dx.doi.org/10.33087/jiubj.v24i3.5488.
Full textSingh, Yuvraj. "WebSec : Exploring and Modulating Vulnerabilities." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30620.
Full textPutra, Fauzan Prasetyo Eka, Ubaidi Ubaidi, Amir Hamzah, Walid Agel Pramadi, and Alief Nuraini. "Systematic Literature Review: Security Gap Detection On Websites Using Owasp Zap." Brilliance: Research of Artificial Intelligence 4, no. 1 (2024): 348–55. http://dx.doi.org/10.47709/brilliance.v4i1.4227.
Full textMuhammad Amirul Mu'min, Yana Safitri, Galih Pramuja Inngam Fanani, Setiawan Ardi Wijaya, and Novi Tristanti. "Security Analysis of XYZ Website Using OWASP Zap Tools." Journix: Journal of Informatics and Computing 1, no. 1 (2025): 10–20. https://doi.org/10.63866/journix.v1i1.1.
Full textAryadi, Tamsir, Andini Putri Salsabila, and Yoga Pratama Nugroho. "Implementasi Secure Code Pada Pengembangan Sistem Keamanan Website Teknik Komputer Universitas Bina Darma Menggunakan Penetration Testing dan OWASP ZAP." JUSTER : Jurnal Sains dan Terapan 4, no. 1 (2025): 27–30. https://doi.org/10.57218/juster.v4i1.1321.
Full textRiyan Farismana and Dian Pramadhana. "Perbandingan Vulnerability Assesment Menggunakan Owasp Zap dan Acunetix Pada Sistem Informasi Repositori Politeknik Negeri Indramayu." Jurnal Teknik Informatika dan Teknologi Informasi 3, no. 2 (2023): 26–32. http://dx.doi.org/10.55606/jutiti.v3i2.2853.
Full textYuzar, Arnefia, and Alam Rahmatulloh. "PERBANDINGAN EFEKTIVITAS OWASP ZAP, ACUNETIX, NIKTO MENGGUNAKAN VULNERABILITY SCANNING UNTUK DETEKSI KERENTANAN APLIKASI WEB." JATI (Jurnal Mahasiswa Teknik Informatika) 9, no. 2 (2025): 2975–82. https://doi.org/10.36040/jati.v9i2.13227.
Full textUmar, Rusydi, Imam Riadi, and Sonny Abriantoro Wicaksono. "APPLICATION OF OWASP ZAP FRAMEWORK FOR SECURITY ANALYSIS OF LMS USING PENTEST METHOD." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 10, no. 2 (2024): 224–30. http://dx.doi.org/10.33480/jitk.v10i2.5534.
Full textRahman, Aulia, Indra Indra, Nuralamsah Zulkarnaim, Muhammad Mukhram, and Agung Rizaldi. "ANALISIS IMPLEMENTASI NUCKLEI VULNERABILITY DAN OWASP-ZAP SCANNER UNTUK DETEKSI KERENTANAN KEAMANAN (SECURE SYSTEM) PADA PLATFORM WEB BASED." Jurnal Komputer Terapan 11, no. 1 (2025): 10–15. https://doi.org/10.35143/jkt.v11i1.6430.
Full textAbdul Fattah Hasibuan, Tommy, and Divi Handoko. "Analisis Keretanan Website Dengan Aplikasi Owasp Zap." Jurnal Ilmu Komputer dan Sistem Informasi 2, no. 2 (2023): 257–70. https://doi.org/10.70340/jirsi.v2i2.51.
Full textNisa, Khairrun, Muklas Adi Putra, Rizky Akbar Siregar, and Muhammad Dedi Irawan. "Analisis Website Tapanuli Tengah Menggunakan Metode Open Web Application Security Project Zap (Owasp Zap)." Bulletin of Information Technology (BIT) 3, no. 4 (2022): 308–216. http://dx.doi.org/10.47065/bit.v3i4.389.
Full textKusuma, Gregorius. "IMPLEMENTASI OWASP ZAP UNTUK PENGUJIAN KEAMANAN SISTEM INFORMASI AKADEMIK." Jurnal Teknologi Informasi: Jurnal Keilmuan dan Aplikasi Bidang Teknik Informatika 16, no. 2 (2022): 178–86. http://dx.doi.org/10.47111/jti.v16i2.3995.
Full textHaeruddin, Gautama Wijaya, Hendra Winata, Sukma Aji, and Muhammad Nur Faiz. "Website Security Analysis Using Vulnerability Assessment Method." Journal of Innovation Information Technology and Application (JINITA) 6, no. 2 (2024): 173–80. https://doi.org/10.35970/jinita.v6i2.2476.
Full textPramuja Inngam Fanani, Galih, Muhammad Amirul Mu’min, and Novi Tristanti. "Analisis dan Pengujian Kerentanan Website Menggunakan OWASP ZAP." Jurnal Riset Sistem dan Teknologi Informasi 3, no. 1 (2025): 36–50. https://doi.org/10.30787/restia.v3i1.1886.
Full textSati, Devani Laras, Devina Laras Sita, and Khairunnisak Nur Isnaini. "Identifikasi Celah Kerentanan Keamanan Pada Website Dengan Metode Pengujian Penetrasi OWASP ZAP." Jurnal RESISTOR (Rekayasa Sistem Komputer) 7, no. 3 (2024): 153–61. https://doi.org/10.31598/jurnalresistor.v7i3.1459.
Full textTara, Tara Rizkayanti, and Yunanri W. "ANALISIS KEAMANAN WEBSITE SISTEM INFORMASI ADMINISTRASI KEPENDUDUKAN MENGGUNAKAN METODE VULNERABILITY ASSESMENT." JURNAL TEKNOLOGI INFORMATIKA DAN KOMPUTER (JURTIKOM) 1, no. 1 (2023): 1–9. http://dx.doi.org/10.51401/jurtikom.v1i1.3172.
Full textHidayat, Nanda, and Muhammad Agung Nugroho. "ANALISIS CELAH KEAMANAN PADA WEBSITE SMA NEGERI 3 BERAU DENGAN METODE PENETRATION TESTING." Journal of Information System Management (JOISM) 6, no. 2 (2025): 102–8. https://doi.org/10.24076/joism.2025v6i2.1858.
Full textBhanu, Mohammad Shinaz, Durgam Varshini, Poosala Srikanth, and Payyavula Lokesh. "Exploiting Vulnerabilities in Weak CAPTCHA Mechanisms within DVWA." Journal of Information Technology and Digital World 7, no. 2 (2025): 119–29. https://doi.org/10.36548/jitdw.2025.2.003.
Full textCarlos P. Flores Jr. "Evaluation of Common Security Vulnerabilities of State Universities and Colleges Websites Based on OWASP." Journal of Electrical Systems 20, no. 5s (2024): 1396–404. http://dx.doi.org/10.52783/jes.2471.
Full textAura Arnelia Zahrani, Dzihni Safwa Alifah, Yulia Cahyani, and Ilham Albana. "Analisis Vulnerability Assessment pada Sistem Informasi Website IITC Intermedia Universitas Amikom Purwokerto Menggunakan OWASP ZAP." Bridge : Jurnal Publikasi Sistem Informasi dan Telekomunikasi 3, no. 2 (2025): 55–68. https://doi.org/10.62951/bridge.v3i2.425.
Full textSyam Al'Am'yubi, Muhammad Ramdani, and Danur Wijayanto. "Analisis Sistem Keamanan Website XYZ Menggunakan Framework OWASP ZAP." Jurnal Ilmu Komputer (JUIK) 3, no. 1 (2023): 1. https://doi.org/10.31314/juik.v3i1.1974.
Full textKurniawan, Henokh, and Erwien Christianto. "Analysis Vulnerability Website Baleomolcreative dengan Metode Penetration Testing Execution Standard & Vulnerability Assessment Pada Http Response Header Field." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 8, no. 3 (2024): 734–45. http://dx.doi.org/10.35870/jtik.v8i3.2202.
Full textKurniawan, Azis, and Kalamullah Ramli. "EFFECTIVENESS OF SECURITY THROUGH OBSCURITY METHODS TO AVOID WEB APPLICATION VULNERABILITY SCANNERS." Jurnal Teknik Informatika (Jutif) 4, no. 6 (2023): 1479–86. http://dx.doi.org/10.52436/1.jutif.2023.4.6.778.
Full textYoon, Jong Moon. "SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking." Jouranl of Information and Security 19, no. 2 (2019): 83–89. http://dx.doi.org/10.33778/kcsa.2019.19.2.083.
Full textAristotel Aaron Agpaoa. "Development and Employment of Cyber Security of e201 File Web Application for Data Center College of the Philippines of Laoag City, Inc." Journal of Electrical Systems 20, no. 5s (2024): 677–83. http://dx.doi.org/10.52783/jes.2289.
Full textPriyawati, Diah, Siti Rokhmah, and Ihsan Cahyo Utomo. "Website Vulnerability Testing and Analysis of Website Application Using OWASP." International Journal of Computer and Information System (IJCIS) 3, no. 3 (2022): 142–47. http://dx.doi.org/10.29040/ijcis.v3i3.90.
Full textLakhtin, Ivan, Dmytro Mykhailenko, and Oleksii Nariezhnii. "Comparison of commercial web application vulnerability scanners and open source scanners." Computer Science and Cybersecurity, no. 2 (December 26, 2022): 41–49. http://dx.doi.org/10.26565/2519-2310-2022-2-05.
Full textNingsih, Shita Widya. "Analisis Pengujian Kerentanan Situs Pemerintahan XYZ dengan PTES." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 8, no. 3 (2021): 1543–56. http://dx.doi.org/10.35957/jatisi.v8i3.1224.
Full textAbdulghaffar, Khaled, Nebrase Elmrabit, and Mehdi Yousefi. "Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners." Computers 12, no. 11 (2023): 235. http://dx.doi.org/10.3390/computers12110235.
Full textNurjannah and Abdul Muni. "ANALISIS KEAMANAN WEBSITE SEKOLAH SMAN 1 TEMPULING DENGAN MENGGUNAKAN OPEN WEB APPLICATION SECURITY PROJECT (OWASP)." JURNAL PERANGKAT LUNAK 6, no. 2 (2024): 351–61. http://dx.doi.org/10.32520/jupel.v6i2.3442.
Full textManiraj, S. P., Chitra Sabapathy Ranganathan, and Satheeshkumar Sekar. "SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING." INTERNATIONAL JOURNAL OF ADVANCES IN SIGNAL AND IMAGE SCIENCES 10, no. 2 (2024): 12–23. https://doi.org/10.29284/ijasis.10.2.2024.12-23.
Full textSabariman, Sabariman, Haeruddin Haeruddin, and Deven Lee. "ANALISIS KERENTANAN APLIKASI AKADEMIK BERBASIS WEBSITE XYZ MENGGUNAKAN OWASP." Jurnal Khatulistiwa Informatika 11, no. 2 (2024): 92–102. http://dx.doi.org/10.31294/jki.v11i2.20194.
Full textDaffa Fernaldy, Naufal, Nurul Maharani Piranti, and Catur Susaningsih. "PENGUJIAN KEAMANAN APLIKASI BERBASIS WEBSITE : SYSTEMATIC LITERATURE REVIEW." JATI (Jurnal Mahasiswa Teknik Informatika) 9, no. 4 (2025): 6826–32. https://doi.org/10.36040/jati.v9i4.13840.
Full textWijayanto, Danur, and Arizona Firdonsyah. "Analisis Tingkat Resiko Pada Website Xyz Menggunakan Metode Owasp." Digital Transformation Technology 4, no. 1 (2024): 644–51. http://dx.doi.org/10.47709/digitech.v4i1.4485.
Full textRiadi, Imam, Abdul Fadlil, and Muhammad Amirul Mu'min. "OWASP Framework-based Network Forensics to Analyze the SQLi Attacks on Web Servers." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 22, no. 3 (2023): 481–94. http://dx.doi.org/10.30812/matrik.v22i3.3018.
Full textAlbalawi, Neaimh, Norah Alamrani, Rasha Aloufi, Mariam Albalawi, Amer Aljaedi, and Adel R. Alharbi. "The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based Vulnerabilities." Electronics 12, no. 12 (2023): 2664. http://dx.doi.org/10.3390/electronics12122664.
Full textAfrizal Ramadhan, M. Fery, and Asri Samsiar Ilmananda. "ANALISIS ANCAMAN KEAMANAN PADA SISTEM INFORMASI AKADEMIK KAMPUS MENGGUNAKAN METODE OWASP ZAP." JATI (Jurnal Mahasiswa Teknik Informatika) 8, no. 4 (2024): 7985–91. http://dx.doi.org/10.36040/jati.v8i4.10599.
Full textAbdillah, Muhammad Dimas, Jaka Gunawan, Rayhan Alfatih Atsil, and Aninda Muliani Harahap. "Analisis Kerentanan Website Mtss Al-Washliyah Bah Gunung Menggunakan Metode Open Web Application Security Project ZAP (OWASP ZAP)." Jurnal Sains dan Teknologi (JSIT) 3, no. 1 (2023): 61–67. http://dx.doi.org/10.47233/jsit.v3i1.487.
Full textAbdullah, Himli S. "Evaluation of Open Source Web Application Vulnerability Scanners." Academic Journal of Nawroz University 9, no. 1 (2020): 47. http://dx.doi.org/10.25007/ajnu.v9n1a532.
Full textAdinugroho, N. Bagas, Purwono Hendradi, and D. Sasongko. "ANALISIS KEAMANAN E-LEARNING MENGGUNAKAN OPEN WEB APPLICATION SECURITY PROJECT (OWASP) (STUDI KASUS MOCA UNIMMA)." Jurnal Informatika 22, no. 2 (2022): 132–38. http://dx.doi.org/10.30873/ji.v22i2.3327.
Full textSaputra, Dio Wahyu, Risqy Siwi Pradini, and Mochammad Anshori. "Analisis dan Rekomendasi Keamanan Website Kampus X Menggunakan ISSAF." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 6, no. 1 (2025): 830–43. https://doi.org/10.35870/jimik.v6i1.1306.
Full textPutra, Bagus Setya, and Dwi Budi Santoso. "Analisis Keamanan Website Berbasis WordPress melalui Penetration Testing untuk Meningkatkan Keamanan Digital." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 9, no. 3 (2025): 981–90. https://doi.org/10.35870/jtik.v9i3.3692.
Full textFathoni, Fathoni, Adzka Fahmi Aulia Hakim, Rifko Akbar, Muhammad Alfarizi Ramadiansyah, and Moh Rizky Sinaga. "ANALISIS KERENTANAN KEAMANAN WEBSITE SISTEM MANAJEMEN ABSENSI KARYAWAN GO DESIGN MENGGUNAKAN METODE OWASP." JATI (Jurnal Mahasiswa Teknik Informatika) 9, no. 4 (2025): 6676–83. https://doi.org/10.36040/jati.v9i4.14151.
Full textBernal Ontiveros, Juan Manuel, Noé Ramón Rosales Morales, Marisela Palacios Reyes, Claudia Anglés Barrios, and Susan Alexandra Cervantes Cardenas. "Metodología OWASP: Un Enfoque para la Prevención y Resolución de Vulnerabilidades." Ciencia Latina Revista Científica Multidisciplinar 9, no. 2 (2025): 1558–76. https://doi.org/10.37811/cl_rcm.v9i2.16991.
Full textSebrina, Aida Fitriya, Achmad Junaidi, and Andreas Nugroho Sihananto. "Testing posketanmu website with google penetration testing and OWASP Top 10." Jurnal Mantik 8, no. 1 (2024): 636–45. http://dx.doi.org/10.35335/mantik.v8i1.5204.
Full textMochammad Fadilah and Nur Nawaningtyas. "Deteksi Kerentanan Keamanan Dan Mitigasi Situs Web Crowdo.Co.Id Berbasis OWASP Zed Attack Proxy (ZAP )." Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika 3, no. 1 (2024): 66–76. https://doi.org/10.61132/merkurius.v3i1.585.
Full textPriambodo, Dimas Febriyan, Asep Dadan Rifansyah, and Muhammad Hasbi. "Penetration Testing Web XYZ Berdasarkan OWASP Risk Rating." Teknika 12, no. 1 (2023): 33–46. http://dx.doi.org/10.34148/teknika.v12i1.571.
Full textAde Gustiyonoo, Erick Irawadi Alwi, and Syahrul Mubarak Abdullah. "Analisa Kerentanan Website Terhadap Serangan Cross-Site Scripting (XSS) Metode Penetration Testing." Cyber Security dan Forensik Digital 7, no. 1 (2024): 25–33. http://dx.doi.org/10.14421/csecurity.2024.7.1.4432.
Full textZahra, Nabila Athifah, Farras Hafish Zidane, and Nur Racana Kuslaila. "ANALISIS KEAMANAN SISTEM INFORMASI PADA WEBSITE PT SENTRA VIDYA UTAMA (SEVIMA) MENGGUNAKAN METODE OWASP." Prosiding Seminar Nasional Teknologi dan Sistem Informasi 3, no. 1 (2023): 384–93. http://dx.doi.org/10.33005/sitasi.v3i1.564.
Full text