A systematic literature review on the characteristics and effectiveness of web application vulnerability scanners

S Alazmi, DC De Leon - IEEE Access, 2022 - ieeexplore.ieee.org
Web applications have been a significant target for successful security breaches in the last
few years. They are currently secured, as a primary method, by searching for their …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

Análisis de Vulnerabilidades de Sistemas Web en desarrollo y en producción

JC Cuevas, RM Muñoz, D Gionantonio… - XX Workshop de …, 2018 - sedici.unlp.edu.ar
La realización de pruebas de penetración permiten detectar las vulnerabilidades de los
sistemas de información, en el caso particular del proyecto de investigación y desarrollo …

Performance-based comparative analysis of open source vulnerability testing tools for web database applications

AK Mishra, A Kumar - 2020 11th International Conference on …, 2020 - ieeexplore.ieee.org
In the last two decades, with the increase of information communications technology, the
cybersecurity threats to web-based data-bases have seen exponential growth. Though the …

Fault-based testing for discovering SQL injection vulnerabilities in web applications

I Alsmadi, A AlEroud, AA Saifan - International Journal of …, 2021 - inderscienceonline.com
In this paper we proposed a model to investigate the behaviour of websites when dealing
with invalid inputs. Many vulnerabilities rise from invalid inputs. An invalid input is …