Academic literature on the topic 'Web vulnerability scanner'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Web vulnerability scanner.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Web vulnerability scanner"

1

Mahajan, Vijay Bhagwan. "Web Application Vulnerability Scanner." International Journal for Research in Applied Science and Engineering Technology 7, no. 6 (June 30, 2019): 386–90. http://dx.doi.org/10.22214/ijraset.2019.6066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maini, Rahul, Rahul Pandey, Rajeev Kumar, and Rajat Gupta. "AUTOMATED WEB VULNERABILITY SCANNER." International Journal of Engineering Applied Sciences and Technology 4, no. 1 (May 31, 2019): 132–36. http://dx.doi.org/10.33564/ijeast.2019.v04i01.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Swarup, Shivam, and Dr R. K. Kapoor. "Web Vulnerability Scanner (WVS): A Tool for detecting Web Application Vulnerabilities." International Journal of Engineering Research 3, no. 2 (February 1, 2014): 126–31. http://dx.doi.org/10.17950/ijer/v3s2/219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Khalid, Muhammad Noman, Muhammad iqbal, Kamran Rasheed, and Malik Muneeb Abid. "Web Vulnerability Finder (WVF): Automated Black- Box Web Vulnerability Scanner." International Journal of Information Technology and Computer Science 12, no. 4 (August 8, 2020): 38–46. http://dx.doi.org/10.5815/ijitcs.2020.04.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dwivedi, Aarushi. "Vulnerability Scanning Technology on Web Applications." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 14, 2021): 991–95. http://dx.doi.org/10.22214/ijraset.2021.35135.

Full text
Abstract:
Modern society is far more dependent on web applications than the previous generations. Even though our dependence is increasing rapidly, the security level is far lower than required. To guarantee the security of the data system in the industry and our daily life, it is especially crucial to find out web application security vulnerabilities quickly and accurately. A vulnerability is a state of being unprotected from the prospect of an attack. It permits an attacker to gain a certain level of command of the site, and possibly the hosting server. One such vulnerability is the cross-site scripting vulnerability. In this exposition, a generic vulnerability scanner is proposed which can be customized to find any number of vulnerabilities. The scanner maps out the website and gives a report of all the vulnerabilities. For the purpose of evaluation, it has been customized to find XSS vulnerability in web applications.
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Jingxia, Xiuling Chen, and Bo Yu. "Design of web vulnerability scanner based on go language." MATEC Web of Conferences 336 (2021): 08010. http://dx.doi.org/10.1051/matecconf/202133608010.

Full text
Abstract:
The vulnerability scanner designed in this paper completed the collection of information and scanning of vulnerability, including six parts: input assets, asset collection, vulnerability profile, plug-in upload, single case detection and report display. The framework of vue realized the front end that included six pages, and the framework of gin realized the back end. The interface completed the separation of the front and back end. The database using MySQL designed seven tables. This scanner can avoid tedious and repetitive work, it can realize automatic scanning and testing of network vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
7

Sagala, Albert, and Elni Manurung. "Testing and Comparing Result Scanning Using Web Vulnerability Scanner." Advanced Science Letters 21, no. 11 (November 1, 2015): 3458–62. http://dx.doi.org/10.1166/asl.2015.6598.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Prazyan, K. A. "BASIC PRINCIPLES OF BUILDING BLACK-BOX VULNERABILITY SCANNER OF WEB RESOURCE." Issues of radio electronics, no. 11 (November 20, 2018): 45–47. http://dx.doi.org/10.21778/2218-5453-2018-11-45-47.

Full text
Abstract:
The article discusses the main provisions for constructing a vulnerability scanner for a web resource based on the «black box» technique. The definitions of the Mealy automaton are introduced, applicable to the web application. An example of the use of the Mealy automaton for constructing transition graphs on the links of a web resource is given. An algorithm for constructing a graph based on sent requests and received answers is proposed. Describe the alleged problems that arise in the scanner. There are proposed ways of solving the problems obtained with the use of additional mechanisms and work algorithms. When the algorithm is running and transitions are added, the new vertex is colored with one of the colors, if a repeated state is detected. As a result, we have a colored graph, which may collapse in the same colors. The user in the browser moving inside the web application performs sequential actions, the scanning technique is as close as possible to the real actions of the average user and provides a top-down view of the content, as well as the probability of clicking on the link. Thus determined group of sequential requests that change the state of the scanner.
APA, Harvard, Vancouver, ISO, and other styles
9

Amankwah, Richard, Jinfu Chen, Patrick Kwaku Kudjo, Beatrice Korkor Agyemang, and Alfred Adutwum Amponsah. "An automated framework for evaluating open-source web scanner vulnerability severity." Service Oriented Computing and Applications 14, no. 4 (July 18, 2020): 297–307. http://dx.doi.org/10.1007/s11761-020-00296-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

W, Yunanri, Imam Riadi, and Anton Yudhana. "Analisis Deteksi Vulnerability Pada Web Server Open Journal System Menggunakan OWASP Scanner." Jurnal Rekayasa Teknologi Informasi (JURTI) 2, no. 1 (June 10, 2018): 1. http://dx.doi.org/10.30872/jurti.v2i1.1319.

Full text
Abstract:
Keamanan merupakan suatu usaha yang dilakukan untuk melindungi informasi yang terdapat didalamnya yang mengacu pada kerahasiaan. Sebuah sistem yang terhubung dengan jaringan internet, akan memiliki tingkat kerawanan tinggi akan menjadi sebuah polemik bagi pemilik layanan sebuah informasi. Metode yang dilakukan adalah mengaudit webserver Open Jurnal System (O.J.S). Kegiatan ini bertujuan untuk mengidentifikasi dan mengekploitasi kerentanan pada webserver Open Jurnal Sistem (O.J.S). Pada penelitian ini menggunakan tool Open Web Aplication Security Project (OWASP). Pengujian ini bertujuan mencari vulnerability pada webserver Open Jurnal Sistem (OJS) adapun tingkatan vulnerability yang dideteksi dalam pengujian ini antara lain high risk, medium risk, low risk. tujuan mengamankan dari serangan SQL Injection maupun Cross Site Scripting XSS, karena akan membawa dampak kegagalan sistem. Manfaat dari pengujian ini sebagai alert atau peringatan. adanya serangan SQl Injection maupun serangan Cross Site Scripting XSS, oleh tool OWASP dalam mengaudit secara mandiri pada webserver Open Jurnal System sendiri.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Web vulnerability scanner"

1

Matti, Erik. "Evaluation of open source web vulnerability scanners and their techniques used to find SQL injection and cross-site scripting vulnerabilities." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177606.

Full text
Abstract:
Both for its simplicity and efficiency to search for the most critical security vulnerabilities that could exist within a web application, a web vulnerability scanner is a popular tool among any company that develops a web application. With the existence of many different scanners that are available to use, one is unlikely the same as the other and the results attained when evaluating these scanners in relation to each other are often not the same. In this thesis, three different open source web vulnerability scanners are evaluated and analysed based on their ability to find SQL injection and cross-site scripting vulnerabilities. The scanners were used on several open source deliberately broken web applications that acted as benchmarks. The benchmarks that caused much diversity in the results from the scanners were further investigated. When analysing the scanners based on the results, both the actual results were analysed on what caused the diversity but most of all the source code of the scanners were explored and investigated. It could be found that the techniques used by the scanners were essentially similar but contained several minor differences that caused the diversity in the results. Most differences were dependant on the variation of the predefined payloads injected by the scanners, but it could also be found that the approaches used to determine if a vulnerability was detected or not could vary as well. The finalised result concluded in a report that reveals and demonstrates the different approaches that any web vulnerability scanner could use and the limitations of them.
APA, Harvard, Vancouver, ISO, and other styles
2

Akrout, Rim. "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web." Phd thesis, INSA de Toulouse, 2012. http://tel.archives-ouvertes.fr/tel-00782565.

Full text
Abstract:
Avec le développement croissant d'Internet, les applications Web sont devenues de plus en plus vulnérables et exposées à des attaques malveillantes pouvant porter atteinte à des propriétés essentielles telles que la confidentialité, l'intégrité ou la disponibilité des systèmes d'information. Pour faire face à ces malveillances, il est nécessaire de développer des mécanismes de protection et de test (pare feu, système de détection d'intrusion, scanner Web, etc.) qui soient efficaces. La question qui se pose est comment évaluer l'efficacité de tels mécanismes et quels moyens peut-on mettre en oeuvre pour analyser leur capacité à détecter correctement des attaques contre les applications web. Dans cette thèse nous proposons une nouvelle méthode, basée sur des techniques de clustering de pages Web, qui permet d'identifier les vulnérabilités à partir de l'analyse selon une approche boîte noire de l'application cible. Chaque vulnérabilité identifiée est réellement exploitée ce qui permet de s'assurer que la vulnérabilité identifiée ne correspond pas à un faux positif. L'approche proposée permet également de mettre en évidence différents scénarios d'attaque potentiels incluant l'exploitation de plusieurs vulnérabilités successives en tenant compte explicitement des dépendances entre les vulnérabilités. Nous nous sommes intéressés plus particulièrement aux vulnérabilités de type injection de code, par exemple les injections SQL. Cette méthode s'est concrétisée par la mise en oeuvre d'un nouveau scanner de vulnérabilités et a été validée expérimentalement sur plusieurs exemples d'applications vulnérables. Nous avons aussi développé une plateforme expérimentale intégrant le nouveau scanner de vulnérabilités, qui est destinée à évaluer l'efficacité de systèmes de détection d'intrusions pour des applicationsWeb dans un contexte qui soit représentatif des menaces auxquelles ces applications seront confrontées en opération. Cette plateforme intègre plusieurs outils qui ont été conçus pour automatiser le plus possible les campagnes d'évaluation. Cette plateforme a été utilisée en particulier pour évaluer deux techniques de détection d'intrusions développées par nos partenaires dans le cadre d'un projet de coopération financé par l'ANR, le projet DALI.
APA, Harvard, Vancouver, ISO, and other styles
3

Shelly, David Andrew. "Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/34464.

Full text
Abstract:
The threat of cyber attacks due to improper security is a real and evolving danger. Corporate and personal data is breached and lost because of web application vulnerabilities thousands of times every year. The large number of cyber attacks can partially be attributed to the fact that web application vulnerability scanners are not used by web site administrators to scan for flaws. Web application vulnerability scanners are tools that can be used by network administrators and security experts to help prevent and detect vulnerabilities such as SQL injection, buffer overflows, cross-site scripting, malicious file execution, and session hijacking. However, these tools have been found to have flaws and limitations as well. Research has shown that web application vulnerability scanners are not capable of always detecting vulnerabilities and attack vectors, and do not give effective measurements of web application security. This research presents a method to analyze the flaws and limitations of several of the most popular commercial and free/open-source web application scanners by using a secure and insecure version of a custom-built web application. Using this described method, key improvements that should be made to web application scanner techniques to reduce the number of false-positive and false-negative results are proposed.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
4

Khalil, Rana Fouad. "Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-box Web Vulnerability Scanners." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/38595.

Full text
Abstract:
Black-box web application vulnerability scanners are automated tools that are used to crawl a web application to look for vulnerabilities. These tools are often used in one of two ways. In the first approach, scanners are used as Point-and-Shoot tools where a scanner is only given the root URL of an application and asked to scan the site. Whereas, in the second approach, scanners are first configured to maximize the crawling coverage and vulnerability detection accuracy. Although the performance of leading commercial scanners has been thoroughly studied, very little research has been done to evaluate open-source scanners. This paper presents a feature and performance evaluation of five open-source scanners. We analyze the crawling coverage, vulnerability detection accuracy, scanning speed, report- ing and usability features. The scanners are tested against two well known benchmarks: WIVET and WAVSEP. Additionally, the scanners are tested against a realistic web application called WackoPicko. The chosen benchmarks are composed of a wide range of vulnerabilities and crawling challenges. Each scanner is tested in two modes: default and configured. Lastly, the scanners are compared with the state of the art commercial scanner Burp Suite Professional. Our results show that being able to properly crawl a web application is a critical task in detecting vulnerabilities. Unfortunately, the majority of the scanners evaluated had difficulty crawling through common web technologies such as dynamically generated JavaScript content and Flash applications. We also identified several classes of vulnerabilities that are not being detected by the scanners. Furthermore, our results show that scanners displayed considerable improvement when run in configured mode.
APA, Harvard, Vancouver, ISO, and other styles
5

Izagirre, Mikel. "Deception strategies for web application security: application-layer approaches and a testing platform." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64419.

Full text
Abstract:
The popularity of the internet has made the use of web applications ubiquitous and essential to the daily lives of people, businesses and governments. Web servers and web applications are commonly used to handle tasks and data that can be critical and highly valuable, making them a very attractive target for attackers and a vector for successful attacks that are aimed at the application layer. Existing misuse and anomaly-based detection and prevention techniques fail to cope with the volume and sophistication of new attacks that are continuously appearing, which suggests that there is a need to provide new additional layers of protection. This work aims to design a new layer of defense based on deception that is employed in the context of web application-layer traffic with the purpose of detecting and preventing attacks. The proposed design is composed of five deception strategies: Deceptive Comments, Deceptive Request Parameters, Deceptive Session Cookies, Deceptive Status Codes and Deceptive JavaScript. The strategies were implemented as a software artifact and their performance evaluated in a testing environment using a custom test script, the OWASP ZAP penetration testing tool and two vulnerable web applications. Deceptive Parameter strategy obtained the best security performance results, followed by Deceptive Comments and Deceptive Status Codes. Deceptive Cookies and Deceptive JavaScript got the poorest security performance results since OWASP ZAP was unable to detect and use deceptive elements generated by these strategies. Operational performance results showed that the deception artifact could successfully be implemented and integrated with existing web applications without changing their source code and adding a low operational overhead.
APA, Harvard, Vancouver, ISO, and other styles
6

Hong, Wei-Da, and 洪偉達. "Selective Entry Point Crawling for Web Vulnerability Scanner." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/aa8z26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jao, Jui-Chien, and 饒瑞謙. "VulCrawl: Adaptive Entry Point Crawler for Web Vulnerability Scanner." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/vt26t7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Next Generation Black-Box Web Application Vulnerability Analysis Framework." Master's thesis, 2017. http://hdl.handle.net/2286/R.I.44256.

Full text
Abstract:
abstract: Web applications are an incredibly important aspect of our modern lives. Organizations and developers use automated vulnerability analysis tools, also known as scanners, to automatically find vulnerabilities in their web applications during development. Scanners have traditionally fallen into two types of approaches: black-box and white-box. In the black-box approaches, the scanner does not have access to the source code of the web application whereas a white-box approach has access to the source code. Today’s state-of-the-art black-box vulnerability scanners employ various methods to fuzz and detect vulnerabilities in a web application. However, these scanners attempt to fuzz the web application with a number of known payloads and to try to trigger a vulnerability. This technique is simple but does not understand the web application that it is testing. This thesis, presents a new approach to vulnerability analysis. The vulnerability analysis module presented uses a novel approach of Inductive Reverse Engineering (IRE) to understand and model the web application. IRE first attempts to understand the behavior of the web application by giving certain number of input/output pairs to the web application. Then, the IRE module hypothesizes a set of programs (in a limited language specific to web applications, called AWL) that satisfy the input/output pairs. These hypotheses takes the form of a directed acyclic graph (DAG). AWL vulnerability analysis module can then attempt to detect vulnerabilities in this DAG. Further, it generates the payload based on the DAG, and therefore this payload will be a precise payload to trigger the potential vulnerability (based on our understanding of the program). It then tests this potential vulnerability using the generated payload on the actual web application, and creates a verification procedure to see if the potential vulnerability is actually vulnerable, based on the web application’s response.
Dissertation/Thesis
Masters Thesis Computer Science 2017
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Web vulnerability scanner"

1

Singh, Shailendra, and Karan Singh. "Performance Analysis of Vulnerability Detection Scanners for Web Systems." In Advances in Intelligent Systems and Computing, 387–99. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8536-9_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Doupé, Adam, Marco Cova, and Giovanni Vigna. "Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners." In Detection of Intrusions and Malware, and Vulnerability Assessment, 111–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14215-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jose, Shilpa, K. Priyadarshini, and K. Abirami. "An Analysis of Black-Box Web Application Vulnerability Scanners in SQLi Detection." In Proceedings of the International Conference on Soft Computing Systems, 177–85. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2674-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gupta, Sunil. "Web Vulnerability Scanner." In Ethical Hacking – Networks and Websites. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4341-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gupta, Shashank, and B. B. Gupta. "BDS." In Handbook of Research on Securing Cloud-Based Databases with Biometric Applications, 174–91. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6559-0.ch008.

Full text
Abstract:
Cross-Site Scripting (XSS) attack is a vulnerability on the client-side browser that is caused by the improper sanitization of the user input embedded in the Web pages. Researchers in the past had proposed various types of defensive strategies, vulnerability scanners, etc., but still XSS flaws remains in the Web applications due to inadequate understanding and implementation of various defensive tools and strategies. Therefore, in this chapter, the authors propose a security model called Browser Dependent XSS Sanitizer (BDS) on the client-side Web browser for eliminating the effect of XSS vulnerability. Various earlier client-side solutions degrade the performance on the Web browser side. But in this chapter, the authors use a three-step approach to bypass the XSS attack without degrading much of the user's Web browsing experience. While auditing the experiments, this approach is capable of preventing the XSS attacks on various modern Web browsers.
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Shashank, and B. B. Gupta. "BDS." In Application Development and Design, 910–27. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3422-8.ch039.

Full text
Abstract:
Cross-Site Scripting (XSS) attack is a vulnerability on the client-side browser that is caused by the improper sanitization of the user input embedded in the Web pages. Researchers in the past had proposed various types of defensive strategies, vulnerability scanners, etc., but still XSS flaws remains in the Web applications due to inadequate understanding and implementation of various defensive tools and strategies. Therefore, in this chapter, the authors propose a security model called Browser Dependent XSS Sanitizer (BDS) on the client-side Web browser for eliminating the effect of XSS vulnerability. Various earlier client-side solutions degrade the performance on the Web browser side. But in this chapter, the authors use a three-step approach to bypass the XSS attack without degrading much of the user's Web browsing experience. While auditing the experiments, this approach is capable of preventing the XSS attacks on various modern Web browsers.
APA, Harvard, Vancouver, ISO, and other styles
7

"Web Server Hacking." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 209–43. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch008.

Full text
Abstract:
Organizational web servers reflect the public image of an organization and serve web pages/information to organizational clients via web browsers using HTTP protocol. Some of the web server software may contain web applications that enable users to perform high-level tasks, such as querying a database and delivering the output through the web server to the client browser as an HTML file. Hackers always try to exploit the different vulnerabilities or flaws existing in web servers and web applications, which can pose a big threat for an organization. This chapter provides the importance of protecting web servers and applications along with the different tools used for analyzing the security of web servers and web applications. The chapter also introduces different web attacks that are carried out by an attacker either to gain illegal access to the web server data or reduce the availability of web services. The web server attacks includes denial of service (DOS) attacks, buffer overflow exploits, website defacement with sql injection (SQLi) attacks, cross site scripting (XSS) attacks, remote file inclusion (RFI) attacks, directory traversal attacks, phishing attacks, brute force attacks, source code disclosure attacks, session hijacking, parameter form tampering, man-in-the-middle (MITM) attacks, HTTP response splitting attacks, cross-site request forgery (XSRF), lightweight directory access protocol (LDAP) attacks, and hidden field manipulation attacks. The chapter explains different web server and web application testing tools and vulnerability scanners including Nikto, BurpSuite, Paros, IBM AppScan, Fortify, Accunetix, and ZAP. Finally, the chapter also discusses countermeasures to be implemented while designing any web application for any organization in order to reduce the risk.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Web vulnerability scanner"

1

Patil, Smita, Nilesh Marathe, and Puja Padiya. "Design of efficient web vulnerability scanner." In 2016 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2016. http://dx.doi.org/10.1109/inventive.2016.7824873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Haibo, Junzuo Chen, Jinfu Chen, Shang Yin, Yiming Wu, and Jiaping Xu. "An Automatic Vulnerability Scanner for Web Applications." In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Al Anhar, Azwar, and Yohan Suryanto. "Evaluation of Web Application Vulnerability Scanner for Modern Web Application." In 2021 International Conference on Artificial Intelligence and Computer Science Technology (ICAICST). IEEE, 2021. http://dx.doi.org/10.1109/icaicst53116.2021.9497831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tung, Yuan-Hsin, Shian-Shyong Tseng, Jen-Feng Shih, and Hwai-Ling Shan. "W-VST: A Testbed for Evaluating Web Vulnerability Scanner." In 2014 14th International Conference on Quality Software (QSIC). IEEE, 2014. http://dx.doi.org/10.1109/qsic.2014.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kumar Singh, Avinash, and Sangita Roy. "A network based vulnerability scanner for detecting SQLI attacks in web applications." In 2012 1st International Conference on Recent Advances in Information Technology (RAIT). IEEE, 2012. http://dx.doi.org/10.1109/rait.2012.6194594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wei, Hanlin, Behnaz Hassanshahi, Guangdong Bai, Padmanabhan Krishnan, and Kostyantyn Vorobyov. "MoScan: a model-based vulnerability scanner for web single sign-on services." In ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3460319.3469081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Basso, Tania, Plinio Cesar Simoes Fernandes, Mario Jino, and Regina Moraes. "Analysis of the effect of Java software faults on security vulnerabilities and their detection by commercial web vulnerability scanner tool." In 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 2010. http://dx.doi.org/10.1109/dsnw.2010.5542602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Makino, Yuma, and Vitaly Klyuev. "Evaluation of web vulnerability scanners." In 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). IEEE, 2015. http://dx.doi.org/10.1109/idaacs.2015.7340766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mburano, Balume, and Weisheng Si. "Evaluation of Web Vulnerability Scanners Based on OWASP Benchmark." In 2018 26th International Conference on Systems Engineering (ICSEng). IEEE, 2018. http://dx.doi.org/10.1109/icseng.2018.8638176.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khoury, Nidal, Pavol Zavarsky, Dale Lindskog, and Ron Ruhl. "Testing and assessing web vulnerability scanners for persistent SQL injection attacks." In the First International Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2107581.2107584.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography