[HTML][HTML] Bridging the gap: A survey and classification of research-informed ethical hacking tools

P Modesti, L Golightly, L Holmes, C Opara… - Journal of Cybersecurity …, 2024 - mdpi.com
The majority of Ethical Hacking (EH) tools utilised in penetration testing are developed by
practitioners within the industry or underground communities. Similarly, academic …

Application layer security for internet communications: A comprehensive review, challenges, and future trends

D Cevallos-Salas, J Estrada-Jiménez… - Computers and Electrical …, 2024 - Elsevier
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …

[HTML][HTML] Enhancing web application security through automated penetration testing with multiple vulnerability scanners

K Abdulghaffar, N Elmrabit, M Yousefi - Computers, 2023 - mdpi.com
Penetration testers have increasingly adopted multiple penetration testing scanners to
ensure the robustness of web applications. However, a notable limitation of many scanning …

Analisis Metode Open Web Application Security Project (OWASP) Menggunakan Penetration Testing pada Keamanan Website Absensi

IO Riandhanu - Jurnal Informasi dan Teknologi, 2022 - jidt.org
The use of technology in various fields increases mobility, one of which is the creation of
websites to share and manage information. Information system security that cannot interfere …

The Reality of Internet Infrastructure and Services Defacement: A Second Look at Characterizing Web-Based Vulnerabilities

N Albalawi, N Alamrani, R Aloufi, M Albalawi, A Aljaedi… - Electronics, 2023 - mdpi.com
In recent years, the number of people using the Internet has increased worldwide, and the
use of web applications in many areas of daily life, such as education, healthcare, finance …

[HTML][HTML] BACAD: AI-based framework for detecting vertical broken access control attacks

A Anas, AA Alhelbawy, S El Gamal… - Egyptian Informatics …, 2024 - Elsevier
Abstract Vertical Broken Access Control (VBAC) vulnerability is one of the most commonly
identified issues in web applications, posing significant risks. Consequently, addressing this …

Uncovering the Risk of Academic Information System Vulnerability through PTES and OWASP Method

FP Utama, RMH Nurhadi - CommIT (Communication and …, 2024 - journal.binus.ac.id
The security of academic information systems needs consideration to anticipate various
threats, resulting in data leakage, misuse of information, modification, and data destruction …

Navigating web application security: A survey of vulnerabilities and detection solutions

A Onukrane, HK Skrodelis… - 2023 IEEE 64th …, 2023 - ieeexplore.ieee.org
In an increasingly digital world, web-based applications have become the cornerstone of
business operations and personal activities. However, this widespread use also exposes …

Systematic literature review on security misconfigurations in web applications

SL Martins, FM Cruz, RP Araújo… - International Journal of …, 2024 - Taylor & Francis
Security misconfigurations are unintentional errors that can lead to vulnerabilities in
applications, compromising an organization's safety. This article aims to provide a …

[PDF][PDF] Automatic detection of safety requests in web and mobile applications using natural language processing techniques

S Salmi, L Oughdir - … Journal of Artificial Intelligence (IJ-AI), 2024 - researchgate.net
Web and mobile applications have become an essential part of our daily lives. However, as
the usage of these applications increases, so does the potential for safety concerns. It is …