Author:
Ali Abdullah Ahmed,Zamri Murah Mohd
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Information technology security assessment (ITSA) methodology for web-based E-government;AIP Conference Proceedings;2024
2. Vulnerabilities That Threaten Web Applications in Afghanistan;Springer Proceedings in Complexity;2024
3. CYBER WEB: An Extension for Scanning Websites;2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN);2023-05-05
4. SEEMA: An Automation Framework for Vulnerability Assessement and Penetration Testing;2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN);2023-05-05
5. Efficient Vulnerability Assessment and Penetration Testing: A Framework for Automation;2023 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES);2023-04-28