Penetration testing is conducted to detect and further to fix the security problems of the Web application. During testing, tools are actively used that allows to avoid performing a large number of monotonous operations by the tester. The problem with selecting the tools is that there are a number of similar tools for testing the same class of security problems, and it is not known which tool is most suitable for a particular case. Such a problem is most often found among novice testers, more experienced testers use their own sets of tools to find specific security problems. Such kits are formed during the work, and each tester finds the most suitable tools for him. The goal of the paper is to create a method that will help to choose a tool...
The possibility of applying machine learning for the classification of malicious requests to aWeb ap...
This thesis focuses on security of web applications, which can be measured by the results of penetra...
Penetration Testing emerged in the mid-1960s as an approach to exploit vulnerabilities of possible a...
A method for detecting denial-of-service attacks on web applications based on the use of a multi-lay...
Purpose. The article is aimed at the development of a methodology for detecting attacks on a compute...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
© International Research Publication House This paper discusses the concept and problem of detecting...
In recent years with the rapid development of Internet and the Web, more and more web applications h...
Purpose. Currently, there appear more often the reports of penetration into computer networks and at...
This article describes basics of neural networks, specifically aimed at usage of freeware to test fr...
In this article the authors give a consideration to a problem of detecting errors and vulnerabilitie...
In this article the authors give a consideration to a problem of detecting errors and vulnerabilitie...
Abstract: Today, testing is the most challenging and dominating activity used by industry, therefore...
Abstract- This paper proposes a hybrid training neural network and applying it to the Accuracy Count...
The large branches of Machine Learning represent an immense support for the detection of malicious w...
The possibility of applying machine learning for the classification of malicious requests to aWeb ap...
This thesis focuses on security of web applications, which can be measured by the results of penetra...
Penetration Testing emerged in the mid-1960s as an approach to exploit vulnerabilities of possible a...
A method for detecting denial-of-service attacks on web applications based on the use of a multi-lay...
Purpose. The article is aimed at the development of a methodology for detecting attacks on a compute...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
© International Research Publication House This paper discusses the concept and problem of detecting...
In recent years with the rapid development of Internet and the Web, more and more web applications h...
Purpose. Currently, there appear more often the reports of penetration into computer networks and at...
This article describes basics of neural networks, specifically aimed at usage of freeware to test fr...
In this article the authors give a consideration to a problem of detecting errors and vulnerabilitie...
In this article the authors give a consideration to a problem of detecting errors and vulnerabilitie...
Abstract: Today, testing is the most challenging and dominating activity used by industry, therefore...
Abstract- This paper proposes a hybrid training neural network and applying it to the Accuracy Count...
The large branches of Machine Learning represent an immense support for the detection of malicious w...
The possibility of applying machine learning for the classification of malicious requests to aWeb ap...
This thesis focuses on security of web applications, which can be measured by the results of penetra...
Penetration Testing emerged in the mid-1960s as an approach to exploit vulnerabilities of possible a...