Exploring the Landscape of Website Vulnerability Scanners: A Comprehensive Review and Comparative Analysis

HM Zangana - Redefining Security With Cyber AI, 2024 - igi-global.com
This chapter provides a comprehensive analysis of web application vulnerability scanners,
examining their characteristics, effectiveness, and implications for web security. Through a …

GAXSS: effective payload generation method to detect XSS vulnerabilities based on genetic algorithm

Z Liu, Y Fang, C Huang, Y Xu - Security and Communication …, 2022 - Wiley Online Library
In the fields of social networking, media, and management, web applications on the Internet
play a very indispensable role. A large amount of personal privacy information and login …

[HTML][HTML] Подходы к оценке поверхности атаки и фаззингу веб-браузеров

АВ Козачок, ДА Николаев… - Вопросы …, 2022 - cyberleninka.ru
Цель работы: разработка подхода к определению поверхности атаки на основе
анализа разности покрытий кода и его применение для анализа веб-браузеров. Метод …

[PDF][PDF] A New Vulnerability Reporting Framework for Software Vulnerability Databases

H Kekül, B Ergen, H Arslan - Int. J. Educ. Manag. Eng, 2021 - academia.edu
Cyber security is one of the fundamental research areas of software engineering. The
systems that make up today's information systems infrastructure have been developed …

Intelligent System for Automation of Security Audits (SIAAS)

JP Seara, C Serrão - EAI Endorsed Transactions on Scalable …, 2024 - publications.eai.eu
Events related to cybersecurity failures have a high and growing financial, operational, and
reputational impact, on organizations around the world. At the same time, there is a shortage …

[PDF][PDF] Design and implementation of web-based smart class routine management system for educational institutes

S Roy, MH Kabir, MT Ahmed - Int. J. Educ. Manage. Eng.(IJEME), 2022 - researchgate.net
Smart Class Routine Management System (SCRMS) is a web application that able to
generate an error-free and effective class schedule automatically. At present, most of the …

Automation of System Security Vulnerabilities Detection Using Open-Source Software

JP Seara, C Serrão - Electronics, 2024 - mdpi.com
Cybersecurity failures have become increasingly detrimental to organizations worldwide,
impacting their finances, operations, and reputation. This issue is worsened by the scarcity …

[PDF][PDF] A multiclass approach to estimating software vulnerability severity rating with statistical and word embedding methods

H Kekül, B ERGEN, H ARSLAN - Int J Comput Netw Inf Secur, 2022 - mecs-press.org
The analysis and grading of software vulnerabilities is an important process that is done
manually by experts today. For this reason, there are time delays, human errors, and …

Risk forecasting of data confidentiality breach using linear regression algorithm

О Korystin, S Nataliia, O Mitina - International Journal of …, 2022 - search.proquest.com
The paper focuses on the study of cyber security in Ukraine and creation of a predictive
model for reducing the risk of identified cyber threats. Forecasting is performed using a …

Enhancing Web Security: An Advanced Automated Kitterman Tool for Comprehensive Network Vulnerability Detection

R Sasikumar, CS Anita, D Rajalakshmi… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
Strong security is essential in the ever-changing world of web applications to ward off
potential dangers. To identify various network vulnerabilities like Cross-Site Scripting …