R Johari, I Kaur, R Tripathi… - 2020 5th International …, 2020 - ieeexplore.ieee.org
Penetration testing, also known as Pen testing is usually performed by a testing professional in order to detect security threats involved in a system. Penetration testing can also be …
N Singh, M Dayal, RS Raw… - 2016 3rd International …, 2016 - ieeexplore.ieee.org
SQL injection can be defined as the technique where hacker executes malicious SQL queries on the database server through a web application to either gain access over the …
AS Al-Ahmad, H Kahtan - Intelligent Computing & Optimization 1, 2019 - Springer
Security testing for applications is a critical practice used to protect data and users. Penetration testing is particularly important, and test case generation is one of its critical …
J Chen, S Hu, H Zheng, C Xing, G Zhang - arXiv preprint arXiv:2204.01975, 2022 - arxiv.org
Penetration testing (PT) is an efficient network testing and vulnerability mining tool by simulating a hacker's attack for valuable information applied in some areas. Compared with …
S Lika, RDP Halim, I Verdian - POSITIF: Jurnal Sistem dan …, 2018 - ejurnal.poliban.ac.id
In today's world, SQL injection is a serious security threat on the Internet for various dynamic web sites on the internet. Because internet usage for various online services is increasing …
P Singhai, A Shrivastava - International Journal of Advanced …, 2015 - search.proquest.com
This paper presents an efficient scheme for image data encryption. In this paper an efficient framework has been presented for data security. In this framework two separate frames are …
N Varshney, K Raghuwanshi - Proceedings of First International …, 2016 - Springer
Java server pages (JSP) and Hypertext Preprocessor (PHP) are the most common scripting language which is used for web designing. Both are used with Hyper Text Markup …
N Sharma, B Gaur - International Journal of Advanced Technology …, 2016 - academia.edu
Identifying possible attacks on the network system is a challenging task. There is several research works are processed in this direction, but the need of improvement is always …
SS Ardiansyah, S Raharjo… - Jurnal …, 2016 - download.garuda.kemdikbud.go.id
The rapid development of information technology enabling everyone to access the needed information instantly. Security becomes a very important factor if the information are …