Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 220,830,738 papers from all fields of science
Search
Sign In
Create Free Account
List of security assessment tools
This is a list of available software and hardware tools that are designed for or are particularly suited to various kinds of security assessment and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
BackTrack
Debian
End-user license agreement
Gentoo Linux
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Programmer Protocol for Identification and Defense of Latest Web Application Security Threats Using Open Source Tools
Devang Sharma
2013
Corpus ID: 16665140
has been an exponential increase in the number of attacks on web applications during the recent years. This paper presents a…
Expand
2004
2004
Model based verification of the Secure Socket Layer (SSL) Protocol for NASA systems
J. Powell
,
D. Gilliam
2004
Corpus ID: 58502792
The National Aeronautics and Space Administration (NASA) has tens of thousands of networked computer systems and applications…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE