A systematic literature review on the characteristics and effectiveness of web application vulnerability scanners

S Alazmi, DC De Leon - IEEE Access, 2022 - ieeexplore.ieee.org
Web applications have been a significant target for successful security breaches in the last
few years. They are currently secured, as a primary method, by searching for their …

Analyzing the traffic of penetration testing tools with an IDS

FR Muñoz, EA Armas Vega, LJG Villalba - The Journal of Supercomputing, 2018 - Springer
Many papers have been published comparing the accuracy of automated tools in looking for
vulnerabilities in web applications. In those previous studies the researchers analyze …

DevSecOps: Enabling security by design in rapid software development

A Ahmed - 2019 - studenttheses.uu.nl
Context: Organizations have been using DevOps for several years now to enable faster
delivery of software to the market. End-to-end DevOps is becoming the goal of …

Mitigating illicit entry using website port scanning tools in indian context

B Jajal, S Iyer, D Chauhan - 2019 6th International Conference …, 2019 - ieeexplore.ieee.org
Protection of a critical digital infrastructure is the biggest challenge being addressed in
recent times. Cyber security plays a crucial role for all types of organizations, be it computer …

An implementation of machine learning to detect real time web application vulnerabilities

TD Diwan, S Choubey, HS Hota - Applications of Mathematical …, 2023 - taylorfrancis.com
Web-based applications are largely vulnerable to Cyber Attacks, which exploit their
vulnerabilities. In this paper, we look at how machine learning algorithms may be applied to …

Enhancing the Performance of Web Application Security Testing: An In-Depth Analysis and Optimization of Web Vulnerability Scanners

S Alazmi - 2023 - search.proquest.com
Web applications have become an indispensable part of our lives today. Meanwhile,
hackers' exploitation of web application vulnerabilities is increasing, and the damages …

Analysis of security CMS platforms by vulnerability scanners

P Zamościński, G Kozieł - Journal of Computer Sciences Institute, 2020 - ph.pollub.pl
Subject of security the most popular CMS platforms has been undertaken in the following
thesis. There were introduced fundamental informations about subject CMS platforms and …

Badanie bezpieczeństwa wybranych platform CMS za pomocą skanerów podatności

P Zamościński, G Kozieł - Journal of Computer Sciences Institute, 2020 - yadda.icm.edu.pl
W niniejszej pracy został podjęty temat bezpieczeństwa najbardziej popularnych platform
CMS. Przedstawiono podstawowe informacje o badanych platformach CMS oraz o …

Técnicas para la optimización del análisis automático de vulnerabilidades en aplicaciones web

F Román Muñoz - 2018 - docta.ucm.es
Actualmente, el uso de aplicaciones web en cualquier ámbito de la vida cotidiana aumenta
ano tras ano. La proliferación de los dispositivos con capacidad de acceso a la red por los …

[PDF][PDF] Poster: Evaluating Black-Box Testing Tools

EAA Vega, ALS Orozco, LJG Villalba - ieee-security.org
The benchmarking of tools for dynamic analysis of vulnerabilities in web applications is
something that is done periodically. Unfortunately, the vast majority of these evaluations are …