Academic literature on the topic 'Web Application Penetration Testing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Web Application Penetration Testing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Web Application Penetration Testing"
Yadav, Saurabh, and Pawan Singh. "Web Application and Penetration Testing." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 1, no. 2 (2020): 1–11. http://dx.doi.org/10.54060/jieee/001.02.003.
Full textDURIC, Z. "WAPTT - Web Application Penetration Testing Tool." Advances in Electrical and Computer Engineering 14, no. 1 (2014): 93–102. http://dx.doi.org/10.4316/aece.2014.01015.
Full textAlanda, Alde, Deni Satria, M. Isthofa Ardhana, Andi Ahmad Dahlan, and Hanriyawan Adnan Mooduto. "Web Application Penetration Testing Using SQL Injection Attack." JOIV : International Journal on Informatics Visualization 5, no. 3 (2021): 320. http://dx.doi.org/10.30630/joiv.5.3.470.
Full textAltulaihan, Esra Abdullatif, Abrar Alismail, and Mounir Frikha. "A Survey on Web Application Penetration Testing." Electronics 12, no. 5 (2023): 1229. http://dx.doi.org/10.3390/electronics12051229.
Full textIrwan, Syarifudin. "PENTESTING DAN ANALISIS KEAMANAN WEB PAUD DIKMAS." PENTESTING DAN ANALISIS KEAMANAN WEB PAUD DIKMAS 1 (April 4, 2018): 6. https://doi.org/10.5281/zenodo.1211847.
Full textMykhailo, Antonishyn, Misnik Oleksii та Tsurkan Vasyl. "Аналіз якості роботи сканерів уразливостей веб-застосунків". Моделювання та інформаційні технології. - 2018. Вип. 83 (6 серпня 2018): 77–86. https://doi.org/10.5281/zenodo.6560216.
Full textSriNithi, D., G. Elavarasi, T. F. Michael Raj, and P. Sivaprakasam. "Improving Web Application Security Using Penetration Testing." Research Journal of Applied Sciences, Engineering and Technology 8, no. 5 (2014): 658–63. http://dx.doi.org/10.19026/rjaset.8.1019.
Full textAl-Khannak, Rafid, and Sajjan Singh Nehal. "Penetration Testing for the Cloud-Based Web Application." WSEAS TRANSACTIONS ON COMPUTERS 22 (August 29, 2023): 104–13. http://dx.doi.org/10.37394/23205.2023.22.13.
Full textChowdhary, Ankur, Kritshekhar Jha, and Ming Zhao. "Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications." Sensors 23, no. 18 (2023): 8014. http://dx.doi.org/10.3390/s23188014.
Full textWijaya, I. Gusti Agung Surya Pramana, Gusti Made Arya Sasmita, and I. Putu Agus Eka Pratama. "Web Application Penetration Testing on Udayana University's OASE E-learning Platform Using Information System Security Assessment Framework (ISSAF) and Open Source Security Testing Methodology Manual (OSSTMM)." International Journal of Information Technology and Computer Science 16, no. 2 (2024): 45–56. http://dx.doi.org/10.5815/ijitcs.2024.02.04.
Full textDissertations / Theses on the topic "Web Application Penetration Testing"
Vernersson, Susanne. "Penetration Testing in a Web Application Environment." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8934.
Full textXiong, Pulei. "A Model-driven Penetration Test Framework for Web Applications." Thesis, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/20552.
Full textCordella, Alessandro. "Web application penetration testing: an analysis of a corporate application according to OWASP guidelines." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/17634/.
Full textSchulz, Pascal. "Penetration Testing of Web Applications in a Bug Bounty Program." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-32404.
Full textKhalil, Rana Fouad. "Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-box Web Vulnerability Scanners." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38595.
Full textOttosson, Henrik, and Per Lindquist. "Penetration testing for the inexperienced ethical hacker : A baseline methodology for detecting and mitigating web application vulnerabilities." Thesis, Linköpings universitet, Databas och informationsteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148581.
Full textIzagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.
Full textCeylan, Batuhan. "Evaluating APS Ecosystem Security : Novel IoT Enabled Medical Platform for Diabetes Patients." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292735.
Full textDušek, Daniel. "Automatizace penetračního testování webových aplikací." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-403167.
Full textNilsson, Robin. "Penetration testing of Android applications." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280290.
Full textBooks on the topic "Web Application Penetration Testing"
Buzaud, Eric. Materials under extreme loadings: Application to penetration and impact. ISTE, 2010.
Find full textMacNichol, Alina Z. Canopy penetration in almond orchards. USDA Forest Service Forest Health Technology Enterprise Team, 1995.
Find full textMeier, J. D. Performance testing guidance for web applications: Patterns & practices. Microsoft, 2007.
Find full text1954-, Subraya B. M., ed. Integrated approach to web performance testing: A practitioner's guide. IRM Press, 2006.
Find full text1975-, Arbon Jason, and Carollo Jeff 1982-, eds. How Google tests software. Addison-Wesley, 2012.
Find full textBarber, Nan, ed. Test-Driven Development with Python: Obey the Testing Goat: Using Django, Selenium & Javascript. 2nd ed. O’Reilly Media, 2017.
Find full textBook chapters on the topic "Web Application Penetration Testing"
Maleh, Yassine. "Introduction to Penetration Testing and Methodologies." In Web Application PenTesting. River Publishers, 2024. http://dx.doi.org/10.1201/9788770046985-1.
Full textMaleh, Yassine. "Mastering DevSecOps for Web Application Penetration Testing." In Web Application PenTesting. River Publishers, 2024. http://dx.doi.org/10.1201/9788770046985-7.
Full textMaleh, Yassine. "Insights into Penetration Testing Reports: A Comprehensive Guide." In Web Application PenTesting. River Publishers, 2024. http://dx.doi.org/10.1201/9788770046985-8.
Full textMaleh, Yassine. "Mastering Web Application Penetration Testing with Burp Suite." In Web Application PenTesting. River Publishers, 2024. http://dx.doi.org/10.1201/9788770046985-6.
Full textAl-Khannak, Rafid, and Sajjan Singh Nehal. "Penetration Testing for the Cloud-Based Web Application." In ICT: Innovation and Computing. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9486-1_3.
Full textWróbel, Tobiasz, Michał Kędziora, Michał Szczepanik, Piotr P. Jóźwiak, Alicja M. Jóźwiak, and Jolanta Mizera–Pietraszko. "Progressive Mobile Web Application Subresource Tampering During Penetration Testing." In Advanced Information Networking and Applications. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75100-5_26.
Full textStepien, Bernard, Pulei Xiong, and Liam Peyton. "A Systematic Approach to Web Application Penetration Testing Using TTCN-3." In Lecture Notes in Business Information Processing. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20862-1_1.
Full textAlhassan, J. K., Sanjay Misra, A. Umar, Rytis Maskeliūnas, Robertas Damaševičius, and Adewole Adewumi. "A Fuzzy Classifier-Based Penetration Testing for Web Applications." In Proceedings of the International Conference on Information Technology & Systems (ICITS 2018). Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73450-7_10.
Full textKachhwaha, Rajendra, and Rajesh Purohit. "Relating Vulnerability and Security Service Points for Web Application Through Penetration Testing." In Advances in Intelligent Systems and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0224-4_4.
Full textSarkar, Sandip. "Detecting Vulnerabilities of Web Application Using Penetration Testing and Prevent Using Threat Modeling." In Lecture Notes in Electrical Engineering. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8752-8_3.
Full textConference papers on the topic "Web Application Penetration Testing"
Rathod, Harsh, Navaneeth Shivananjappa, and Reiner M. Creutzburg. "Web app security: methodology for evaluating web application penetration testing tools." In Multimodal Image Exploitation and Learning 2025, edited by Sos S. Agaian, Stephen P. DelMarco, and Vijayan K. Asari. SPIE, 2025. https://doi.org/10.1117/12.3054798.
Full textSánchez, Gustavo, Olakunle Olayinka, and Aryan Pasikhani. "Web Application Penetration Testing with Artificial Intelligence: A Systematic Review." In 2024 22nd International Symposium on Network Computing and Applications (NCA). IEEE, 2024. https://doi.org/10.1109/nca61908.2024.00043.
Full textGupta, Siddarth, M. Rohini, M. Manasa, S. Teja, and R. Sahana Lokesh. "Enhancing Web Application Security Using Penetration Testing and Vulnerability Scanning." In 2025 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2025. https://doi.org/10.1109/ickecs65700.2025.11036050.
Full textRoshini, A., N. Suganthi, Dhivakar S, et al. "An Efficient Penetration testing framework for Web Applications." In 2025 3rd International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA). IEEE, 2025. https://doi.org/10.1109/icaeca63854.2025.11012433.
Full textEchefunna, Chinekezi Chinyere, Jude Osamor, Celestine Iwendi, Pius Owoh, Moses Ashawa, and Anand Philip. "Evaluation of Information Security in Web Application Through Penetration Testing Techniques Using OWASP Risk Methodology." In 2024 International Conference on Advances in Computing Research on Science Engineering and Technology (ACROSET). IEEE, 2024. http://dx.doi.org/10.1109/acroset62108.2024.10743903.
Full textKumar, Niharika P., Vijay Kumar Gowda K. K, and Dhanushree M. S. "AIPenTool: A Unified Approach to Automated Penetration Testing for Enhanced Network and Web Application Security." In 2025 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE). IEEE, 2025. https://doi.org/10.1109/iitcee64140.2025.10915305.
Full textAriami, Dessy, Susila Windarta, Dimas Febriyan Priambodo, and Amiruddin Amiruddin. "Combining STRIDE and Penetration Testing for Improved Web Application Security: A Case Study on Stored XSS Vulnerabilities." In 2024 Beyond Technology Summit on Informatics International Conference (BTS-I2C). IEEE, 2024. https://doi.org/10.1109/bts-i2c63534.2024.10942270.
Full textGinting, Lit Malem, Suhardi, Kusprasapta Mutijarsa, and Anthon Roberto Tampubolon. "Web App Penetration Testing Method: A Review." In 2024 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2024. https://doi.org/10.1109/icitsi65188.2024.10929132.
Full textJuliadi, Rizki, Parman Sukarno, and Aulia Arif Wardana. "Web Penetration Testing Using Collaborative Multi-Agents and Integrated Reporting." In 2025 International Conference on Advancement in Data Science, E-learning and Information System (ICADEIS). IEEE, 2025. https://doi.org/10.1109/icadeis65852.2025.10933244.
Full textStraub, Jeremy. "Application of Robotic Exploration Principles to the Challenge of Cybersecurity Penetration Testing." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679404.
Full textReports on the topic "Web Application Penetration Testing"
Christensen, Lance. PR-459-133750-WEB Fast, Accurate, Automated System to Find and Quantify Natural Gas Leaks. Pipeline Research Council International, Inc. (PRCI), 2019. http://dx.doi.org/10.55274/r0011608.
Full textHayford. L51566 Ultralow Frequency Eddy Current Instrument for the Detection and Sizing of Stress Corrosion Cracks. Pipeline Research Council International, Inc. (PRCI), 1988. http://dx.doi.org/10.55274/r0010601.
Full textDinovitzer, Aaron. PR-214-204505-R01 HAZ Softening Susceptibility Test Development. Pipeline Research Council International, Inc. (PRCI), 2022. http://dx.doi.org/10.55274/r0012219.
Full textbin Ahsan, Wahid. The EDIT UX Framework: A User-Centered Approach to Effective Product Redesign. Userhub, 2024. http://dx.doi.org/10.58947/zxkd-kldq.
Full text