Exploring the Landscape of Website Vulnerability Scanners: A Comprehensive Review and Comparative Analysis
HM Zangana - Redefining Security With Cyber AI, 2024 - igi-global.com
This chapter provides a comprehensive analysis of web application vulnerability scanners,
examining their characteristics, effectiveness, and implications for web security. Through a …
examining their characteristics, effectiveness, and implications for web security. Through a …
GAXSS: effective payload generation method to detect XSS vulnerabilities based on genetic algorithm
In the fields of social networking, media, and management, web applications on the Internet
play a very indispensable role. A large amount of personal privacy information and login …
play a very indispensable role. A large amount of personal privacy information and login …
[HTML][HTML] Подходы к оценке поверхности атаки и фаззингу веб-браузеров
АВ Козачок, ДА Николаев… - Вопросы …, 2022 - cyberleninka.ru
Цель работы: разработка подхода к определению поверхности атаки на основе
анализа разности покрытий кода и его применение для анализа веб-браузеров. Метод …
анализа разности покрытий кода и его применение для анализа веб-браузеров. Метод …
[PDF][PDF] A New Vulnerability Reporting Framework for Software Vulnerability Databases
Cyber security is one of the fundamental research areas of software engineering. The
systems that make up today's information systems infrastructure have been developed …
systems that make up today's information systems infrastructure have been developed …
Intelligent System for Automation of Security Audits (SIAAS)
Events related to cybersecurity failures have a high and growing financial, operational, and
reputational impact, on organizations around the world. At the same time, there is a shortage …
reputational impact, on organizations around the world. At the same time, there is a shortage …
[PDF][PDF] Design and implementation of web-based smart class routine management system for educational institutes
Smart Class Routine Management System (SCRMS) is a web application that able to
generate an error-free and effective class schedule automatically. At present, most of the …
generate an error-free and effective class schedule automatically. At present, most of the …
Automation of System Security Vulnerabilities Detection Using Open-Source Software
Cybersecurity failures have become increasingly detrimental to organizations worldwide,
impacting their finances, operations, and reputation. This issue is worsened by the scarcity …
impacting their finances, operations, and reputation. This issue is worsened by the scarcity …
[PDF][PDF] A multiclass approach to estimating software vulnerability severity rating with statistical and word embedding methods
The analysis and grading of software vulnerabilities is an important process that is done
manually by experts today. For this reason, there are time delays, human errors, and …
manually by experts today. For this reason, there are time delays, human errors, and …
Risk forecasting of data confidentiality breach using linear regression algorithm
О Korystin, S Nataliia, O Mitina - International Journal of …, 2022 - search.proquest.com
The paper focuses on the study of cyber security in Ukraine and creation of a predictive
model for reducing the risk of identified cyber threats. Forecasting is performed using a …
model for reducing the risk of identified cyber threats. Forecasting is performed using a …
Enhancing Web Security: An Advanced Automated Kitterman Tool for Comprehensive Network Vulnerability Detection
Strong security is essential in the ever-changing world of web applications to ward off
potential dangers. To identify various network vulnerabilities like Cross-Site Scripting …
potential dangers. To identify various network vulnerabilities like Cross-Site Scripting …