Journal articles on the topic 'Web Application Penetration Testing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Web Application Penetration Testing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yadav, Saurabh, and Pawan Singh. "Web Application and Penetration Testing." Journal of Informatics Electrical and Electronics Engineering (JIEEE) 1, no. 2 (2020): 1–11. http://dx.doi.org/10.54060/jieee/001.02.003.
Full textDURIC, Z. "WAPTT - Web Application Penetration Testing Tool." Advances in Electrical and Computer Engineering 14, no. 1 (2014): 93–102. http://dx.doi.org/10.4316/aece.2014.01015.
Full textAlanda, Alde, Deni Satria, M. Isthofa Ardhana, Andi Ahmad Dahlan, and Hanriyawan Adnan Mooduto. "Web Application Penetration Testing Using SQL Injection Attack." JOIV : International Journal on Informatics Visualization 5, no. 3 (2021): 320. http://dx.doi.org/10.30630/joiv.5.3.470.
Full textAltulaihan, Esra Abdullatif, Abrar Alismail, and Mounir Frikha. "A Survey on Web Application Penetration Testing." Electronics 12, no. 5 (2023): 1229. http://dx.doi.org/10.3390/electronics12051229.
Full textIrwan, Syarifudin. "PENTESTING DAN ANALISIS KEAMANAN WEB PAUD DIKMAS." PENTESTING DAN ANALISIS KEAMANAN WEB PAUD DIKMAS 1 (April 4, 2018): 6. https://doi.org/10.5281/zenodo.1211847.
Full textMykhailo, Antonishyn, Misnik Oleksii та Tsurkan Vasyl. "Аналіз якості роботи сканерів уразливостей веб-застосунків". Моделювання та інформаційні технології. - 2018. Вип. 83 (6 серпня 2018): 77–86. https://doi.org/10.5281/zenodo.6560216.
Full textSriNithi, D., G. Elavarasi, T. F. Michael Raj, and P. Sivaprakasam. "Improving Web Application Security Using Penetration Testing." Research Journal of Applied Sciences, Engineering and Technology 8, no. 5 (2014): 658–63. http://dx.doi.org/10.19026/rjaset.8.1019.
Full textAl-Khannak, Rafid, and Sajjan Singh Nehal. "Penetration Testing for the Cloud-Based Web Application." WSEAS TRANSACTIONS ON COMPUTERS 22 (August 29, 2023): 104–13. http://dx.doi.org/10.37394/23205.2023.22.13.
Full textChowdhary, Ankur, Kritshekhar Jha, and Ming Zhao. "Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications." Sensors 23, no. 18 (2023): 8014. http://dx.doi.org/10.3390/s23188014.
Full textWijaya, I. Gusti Agung Surya Pramana, Gusti Made Arya Sasmita, and I. Putu Agus Eka Pratama. "Web Application Penetration Testing on Udayana University's OASE E-learning Platform Using Information System Security Assessment Framework (ISSAF) and Open Source Security Testing Methodology Manual (OSSTMM)." International Journal of Information Technology and Computer Science 16, no. 2 (2024): 45–56. http://dx.doi.org/10.5815/ijitcs.2024.02.04.
Full textSharan, Leelark. "Study on Penetration Testing of Modern Web Application Vulnerabilities." International Journal of Computer Applications 181, no. 22 (2018): 44–50. http://dx.doi.org/10.5120/ijca2018917958.
Full textJha, Tapan Kumar. "Modern Web Application Penetration Testing Tools: A Comparative Analysis." International Journal of Recent Research and Review XVII, no. 4 (2024): 171–85. https://doi.org/10.62233/ijrrr26.
Full textBerloh, Yevhenii, Andrii Rohovenko, and Hanna Dyvnych. "RESEARCH OF METHODS OF AUTOMATED SEARCH OF “SQL INJECTION” TYPE VULNERABILITIES IN WEB APPLICATIONS." Technical Sciences and Technologies, no. 4(30) (2022): 113–20. http://dx.doi.org/10.25140/2411-5363-2022-4(30)-113-120.
Full textShahid, Jahanzeb, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali, and Noel Crespi. "A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions." Applied Sciences 12, no. 8 (2022): 4077. http://dx.doi.org/10.3390/app12084077.
Full textSudha, T. Gnana, N. Snehalatha, and A. Komala. "Penetration Testing and Simulation for Vulnerability Assessment in Application Security." International Research Journal of Innovations in Engineering and Technology 09, Special Issue ICCIS (2025): 75–79. https://doi.org/10.47001/irjiet/2025.iccis-202511.
Full textSulisnawati, Nani, and Subektiningsih Subektiningsih. "Implementation of Open Web Application Security Project for Penetration Testing on Educational Institution Websites." Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 9, no. 2 (2023): 250–67. https://doi.org/10.26555/jiteki.v9i2.25987.
Full textOlena, Trofymenko, Dyka Anastasiia, and Loboda Yuliia. "Analysis of vulnerabilities and security problems of web applications." System technologies 3, no. 146 (2023): 25–37. http://dx.doi.org/10.34185/1562-9945-3-146-2023-03.
Full textRavindran, Urshila, and Raghu Vamsi Potukuchi. "A Review on Web Application Vulnerability Assessment and Penetration Testing." Review of Computer Engineering Studies 9, no. 1 (2022): 1–22. http://dx.doi.org/10.18280/rces.090101.
Full textManjunath, Srujana, Shreya Malshetty, Jayalakshmi D., Chaithra Banger, and Y. Sharmasth Vali. "A Comprehensive NIDS-Based Strategy for Web Application Penetration Testing." International Journal of Computer Science and Engineering 11, no. 12 (2024): 1–6. https://doi.org/10.14445/23488387/ijcse-v11i12p101.
Full textPriambodo, Dimas Febriyan, Asep Dadan Rifansyah, and Muhammad Hasbi. "Penetration Testing Web XYZ Berdasarkan OWASP Risk Rating." Teknika 12, no. 1 (2023): 33–46. http://dx.doi.org/10.34148/teknika.v12i1.571.
Full textAlbahar, Marwan, Dhoha Alansari, and Anca Jurcut. "An Empirical Comparison of Pen-Testing Tools for Detecting Web App Vulnerabilities." Electronics 11, no. 19 (2022): 2991. http://dx.doi.org/10.3390/electronics11192991.
Full textHafiz, Naufal, Obrina Candra Briliyant, Dimas Febriyan Priambodo, Muhammad Hasbi, and Sri Siswanti. "Remote Penetration Testing with Telegram Bot." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, no. 3 (2023): 705–14. http://dx.doi.org/10.29207/resti.v7i3.4870.
Full textSiva Prasad, K., Dr K. Raja Sekhar, and Dr P. Rajarajeswari. "An Integrated Approach Towards Vulnerability Assessment & Penetration Testing for a Web Application." International Journal of Engineering & Technology 7, no. 2.32 (2018): 431. http://dx.doi.org/10.14419/ijet.v7i2.32.15733.
Full textBegum, M. Fathima, Lekha Sree C, and Manasa P. "Enhancement of Web Application Security using SQLMap and Machine Learning." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 267–72. https://doi.org/10.47001/irjiet/2025.inspire43.
Full textAbdulghaffar, Khaled, Nebrase Elmrabit, and Mehdi Yousefi. "Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners." Computers 12, no. 11 (2023): 235. http://dx.doi.org/10.3390/computers12110235.
Full textSingh, Yuvraj. "WebSec : Exploring and Modulating Vulnerabilities." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30620.
Full textKOZEL, V. M., IE A. DROZDOVA, O. I. IVANCHUK, and O. О. PRYKHODKO. "RESEARCH OF PENETRATION TESTING METHODS." Вісник Херсонського національного технічного університету, no. 3(90) (November 26, 2024): 221–27. http://dx.doi.org/10.35546/kntu2078-4481.2024.3.28.
Full textNilesh, Bhingardeve, and Franklin Seeza. "A Comparison Study of Open Source Penetration Testing Tools." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 2595–97. https://doi.org/10.31142/ijtsrd15662.
Full textSandeep, Phanireddy. "Advancing Security: Penetration Testing in Web Applications Powered by Artificial Intelligence." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 6, no. 4 (2020): 1–7. https://doi.org/10.5281/zenodo.14787314.
Full textRohith, Vallabhaneni, and Veeramachaneni Vinod. "Understanding Penetration Testing for Evaluating Vulnerabilities and Enhancing Cyber Security." Engineering and Technology Journal 9, no. 10 (2024): 5335–37. https://doi.org/10.5281/zenodo.13928567.
Full textArmando, Yoel, and Rosalina Rosalina. "Penetration Testing Tangerang City Web Application With Implementing OWASP Top 10 Web Security Risks Framework." JISA(Jurnal Informatika dan Sains) 6, no. 2 (2023): 105–9. http://dx.doi.org/10.31326/jisa.v6i2.1656.
Full textSamburskaya, S. А. "DEVELOPMENT OF A SECURE LOGGING AND MANAGEMENT SYSTEM FOR PENETRATION TESTING." Herald of the Kazakh-British technical university 20, no. 2 (2023): 125–36. http://dx.doi.org/10.55452/1998-6688-2023-20-2-125-136.
Full textMelnikova, Anastasia, and Igor Karmanov. "DEVELOPMENT OF THE METHODOLOGY FOR PENETRATION TESTING OF MOBILE AND WEB APPLICATIONS." Interexpo GEO-Siberia 9 (2019): 47–53. http://dx.doi.org/10.33764/2618-981x-2019-9-47-53.
Full textJha, Tapan Kumar, and Riddhi Soral. "Virtual Penetration Testing (VPT): A Next-Gen Approach To Web Application Security." International Journal of Recent Research and Review XVIII, no. 1 (2025): 281–98. https://doi.org/10.62233/ijrrr25.
Full textBhardwaj, Barkha, and Shivam Tiwari. "Penetration Testing and Data Privacy: An In-Depth Review." Journal of Cyber Security in Computer System 2, no. 1 (2023): 18–22. http://dx.doi.org/10.46610/jcscs.2023.v02i01.003.
Full textHasan, Abualese, and Al-Rousan Thamer. "A comparative study of web application security scanners for vulnerability detection." i-manager’s Journal on Software Engineering 17, no. 4 (2023): 1. http://dx.doi.org/10.26634/jse.17.4.19813.
Full textLuthfi Arian Nugraha. "Website Penetration Analysis Against XSS Attacks using Payload Method." Journal of Innovation Information Technology and Application (JINITA) 6, no. 1 (2024): 37–44. http://dx.doi.org/10.35970/jinita.v6i1.2225.
Full textTolkachova, Anastasiia, and Andriian Piskozub. "METHODS FOR TESTING THE SECURITY OF WEB APPLICATIONS." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 115–22. https://doi.org/10.28925/2663-4023.2024.26.668.
Full textKumar CSA, Ayush. "Ethical Hacking and Penetration Testing." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–9. https://doi.org/10.55041/isjem02790.
Full textVikas, Vippalapalli, G. Saisri, T. Sai Meghana, A. Sree Harshini, and G. Kaveri. "Web Security Audit and Penetration Testing: Identifying Vulnerabilities and Strengthening Website Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (2023): 794–805. http://dx.doi.org/10.22214/ijraset.2023.54658.
Full textZhuravchak, Anastasiia, Andrian Piskozub, Bohdan Skorynovych, et al. "Design and development of a large language model-based tool for vulnerability detection." Eastern-European Journal of Enterprise Technologies 2, no. 2 (134) (2025): 75–83. https://doi.org/10.15587/1729-4061.2025.325251.
Full textHidayatulloh, Syarif, and Desky Saptadiaji. "Penetration Testing pada Website Universitas ARS Menggunakan Open Web Application Security Project (OWASP)." Jurnal Algoritma 18, no. 1 (2021): 77–86. http://dx.doi.org/10.33364/algoritma/v.18-1.827.
Full textBalwante, ShriKrishna, Jyotiraditya Dhamdhere, and Kunal Pawar. "Design and Implementation of an Enhanced Web Application Vulnerability Scanner." International Journal of Innovative Research in Computer Science and Technology 13, no. 2 (2025): 89–95. https://doi.org/10.55524/ijircst.2025.13.2.13.
Full textKasturi, Santanam, Xiaolong Li, John Pickard, and Peng Li. "Prioritization of Application Security Vulnerability Remediation Using Metrics, Correlation Analysis, and Threat Model." American Journal of Software Engineering and Applications 12, no. 1 (2024): 5–13. http://dx.doi.org/10.11648/j.ajsea.20241201.12.
Full textSahil, A. Bhat, N. Pankar Vitthal, Kumari Namrata, and Desale Vrushali. "Testing Tool: Offensive Server Side Security Analyser." Journal of Web Development and Web Designing 4, no. 2 (2019): 10–11. https://doi.org/10.5281/zenodo.3240738.
Full textSunaringtyas, Septia Ulfa, and Djodi Surya Prayoga. "Implementasi Penetration Testing Execution Standard Untuk Uji Penetrasi Pada Layanan Single Sign-On." Edu Komputika Journal 8, no. 1 (2021): 48–56. http://dx.doi.org/10.15294/edukomputika.v8i1.47179.
Full textRaja Sekhar, K., Pavanasurya M, Komal Bharti, and Dhanya G. "A systematic review of vulnerability analysis & penetration testing tools." International Journal of Engineering & Technology 7, no. 1.1 (2017): 411. http://dx.doi.org/10.14419/ijet.v7i1.1.9944.
Full textLai, Sen Tarng. "Corrective Maintenance Based Vulnerability Repair Procedure to Improve Web Application Security." Applied Mechanics and Materials 182-183 (June 2012): 2085–90. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.2085.
Full textFitriana, Dina Nurika Fitriana, Putri Elfa Mas’udia, and Mila Kusumawardani. "NIST SP 800-115 Framework Implementation using Black Box Method on Security Gaps Testing on JTD Polinema’s Official Website." jartel 13, no. 4 (2023): 328–35. http://dx.doi.org/10.33795/jartel.v13i4.557.
Full textMuhammad Risky Ardiansyah, Muhlis Tahir, Andi Risqita Nuria Fawash, et al. "Analisis Kerentanan Keamanan Website Menggunakan Metode PTES (Penetration Testing Execution And Standart)." NUANSA INFORMATIKA 18, no. 2 (2024): 145–53. http://dx.doi.org/10.25134/ilkom.v18i2.119.
Full text