Mutai, 2019 - Google Patents
Hybrid Multi-Agents System Vulnerability Scanner For Detecting SQL Injection Attacks In Web ApplicationsMutai, 2019
View PDF- Document ID
- 12130125049275370022
- Author
- Mutai H
- Publication year
External Links
Snippet
Web applications form part of our daily life due to their appropriateness, flexibility, availability, usability and interoperability. This has allowed most organizations map their businesses globally and facilitate information exchange. They embrace a multi-tier …
- 239000003795 chemical substances by application 0 title abstract description 158
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10503910B2 (en) | Security testing framework including virtualized server-side platform | |
US10505966B2 (en) | Cross-site request forgery (CSRF) vulnerability detection | |
Zhang et al. | Efficiency and effectiveness of web application vulnerability detection approaches: A review | |
Auricchio et al. | An automated approach to web offensive security | |
Román Muñoz et al. | Enlargement of vulnerable web applications for testing | |
Noseevich et al. | Detecting insufficient access control in web applications | |
Vu et al. | A benchmark comparison of python malware detection approaches | |
Zhu et al. | Detecting privilege escalation attacks through instrumenting web application source code | |
Homaei et al. | Athena: A framework to automatically generate security test oracle via extracting policies from source code and intended software behaviour | |
Yan et al. | Understanding and Detecting File Knowledge Leakage in GPT App Ecosystem | |
Charoenwet et al. | Toward effective secure code reviews: an empirical study of security-related coding weaknesses | |
Alidoosti et al. | Evaluating the web‐application resiliency to business‐layer DoS attacks | |
Dharam et al. | Runtime monitoring technique to handle tautology based SQL injection attacks | |
Smeets | Improving the adoption of dynamic web security vulnerability scanners | |
Alsaedi et al. | Black-box fuzzing approaches to secure web applications: Survey | |
Di Stasio | Evaluation of static security analysis tools on open source distributed applications | |
Xia et al. | WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets | |
Hammoudeh et al. | The study on assessment of security web applications | |
Mutai | Hybrid Multi-Agents System Vulnerability Scanner For Detecting SQL Injection Attacks In Web Applications | |
Li et al. | Les Dissonances: Cross-Tool Harvesting and Polluting in Multi-Tool Empowered LLM Agents | |
Gholami et al. | Automated secure code review for web-applications | |
Muiruri | A hybrid algorithm for detecting web-based applications vulnerabilities | |
Nunes | Blended security analysis for web applications: Techniques and tools | |
Kilaru | Improving techniques for SQL injection defenses | |
Alazmi | Enhancing the Performance of Web Application Security Testing: An In-Depth Analysis and Optimization of Web Vulnerability Scanners |