Author:
Auricchio Nicola,Cappuccio Andrea,Caturano Francesco,Perrone Gaetano,Romano Simon Pietro
Subject
Computer Networks and Communications
Reference42 articles.
1. D. Geer, J. Harthorne, Penetration testing: A duet, in: Proceedings - Annual Computer Security Applications Conference, Vol. 2002-January, ACSAC, 2002, pp. 185–195.
2. W. Halfond, S. Choudhary, A. Orso, Penetration testing with improved input vector identification, in: Proceedings - 2nd International Conference on Software Testing, Verification, and Validation, ICST 2009, 2009, pp. 346–355.
3. S. Nagpure, S. Kurkure, Vulnerability Assessment and Penetration Testing of Web Application, in: 2017 International Conference on Computing, Communication, Control and Automation, ICCUBEA 2017, 2018.
4. The open web application security project;Doe,2006
5. OWASP Top Ten Project,2017
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Including insider threats into risk management through Bayesian threat graph networks;Computers & Security;2023-10
2. The Usage of Machine Learning on Penetration Testing Automation;2023 3rd International Conference on Electronic and Electrical Engineering and Intelligent System (ICE3IS);2023-08-09
3. Web Security and Web Application Security: Attacks and Prevention;2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS);2023-03-17
4. A Survey on Web Application Penetration Testing;Electronics;2023-03-04