Mirjalili et al., 2014 - Google Patents
A survey on web penetration testMirjalili et al., 2014
View PDF- Document ID
- 4697551608313122022
- Author
- Mirjalili M
- Nowroozi A
- Alidoosti M
- Publication year
- Publication venue
- Advances in Computer Science: an International Journal
External Links
Snippet
This paper reviews the penetration test specifically in the field of web. For this purpose, it first reviews articles generally on penetration test and its associated methods. Then articles in the field of web penetration test are examined in three aspects: comparing automatic …
- 230000035515 penetration 0 title abstract description 95
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01M—TESTING STATIC OR DYNAMIC BALANCE OF MACHINES OR STRUCTURES; TESTING STRUCTURES OR APPARATUS NOT OTHERWISE PROVIDED FOR
- G01M3/00—Investigating fluid-tightness of structures
- G01M3/02—Investigating fluid-tightness of structures by using fluid or vacuum
- G01M3/04—Investigating fluid-tightness of structures by using fluid or vacuum by detecting the presence of fluid at the leakage point
- G01M3/20—Investigating fluid-tightness of structures by using fluid or vacuum by detecting the presence of fluid at the leakage point using special tracer materials, e.g. dye, fluorescent material, radioactive material
- G01M3/22—Investigating fluid-tightness of structures by using fluid or vacuum by detecting the presence of fluid at the leakage point using special tracer materials, e.g. dye, fluorescent material, radioactive material for pipes, cables or tubes; for pipe joints or seals; for valves; for welds; for containers, e.g. radiators
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
- G01N3/00—Investigating strength properties of solid materials by application of mechanical stress
- G01N3/08—Investigating strength properties of solid materials by application of mechanical stress by applying steady tensile or compressive forces
- G01N3/10—Investigating strength properties of solid materials by application of mechanical stress by applying steady tensile or compressive forces generated by pneumatic or hydraulic pressure
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
- G01N2203/00—Investigating strength properties of solid materials by application of mechanical stress
- G01N2203/02—Details not specific for a particular testing method
- G01N2203/026—Specifications of the specimen
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01N—INVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
- G01N3/00—Investigating strength properties of solid materials by application of mechanical stress
- G01N3/40—Investigating hardness or rebound hardness
- G01N3/42—Investigating hardness or rebound hardness by performing impressions under a steady load by indentors, e.g. sphere, pyramid
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xiong et al. | Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix | |
Mirjalili et al. | A survey on web penetration test | |
Shah et al. | An overview of vulnerability assessment and penetration testing techniques | |
Holm et al. | P $^{2} $ CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language | |
Wysopal et al. | The art of software security testing: identifying software security flaws | |
Kotenko et al. | Security analysis of information systems taking into account social engineering attacks | |
Johari et al. | Penetration testing in IoT network | |
De Jimenez | Pentesting on web applications using ethical-hacking | |
Hussain et al. | Penetration testing in system administration | |
Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
Chiem | A study of penetration testing tools and approaches | |
Lachkov et al. | Vulnerability assessment for applications security through penetration simulation and testing | |
Subedi et al. | Secure paradigm for web application development | |
Kamal et al. | Risk assessment, threat modeling and security testing in SDLC | |
Phong et al. | An overview of penetration testing | |
Davis et al. | A framework for programming and budgeting for cybersecurity | |
Hristova et al. | Security assessment methodology for industrial control system products | |
Rahalkar | Network Vulnerability Assessment: Identify security loopholes in your network’s infrastructure | |
Mamilla | A study of penetration testing processes and tools | |
Kakareka | What Is Vulnerability Assessment? | |
Darus et al. | Web vulnerability assessment tool for content management system | |
Malkawi et al. | Automation of active reconnaissance phase: an automated API-based port and vulnerability scanner | |
Pandikumar et al. | Detecting web application vulnerability using dynamic analysis with penetration testing | |
Ashfaq | DEVELOPMENT OF A SECURITY TESTING PROCESS FOR YOCTO LINUX-BASED DISTRIBUTIONS | |
Singh et al. | Penetration testing: analyzing the security of the network by Hacker’s mind |