Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,721,904 papers from all fields of science
Search
Sign In
Create Free Account
Nikto
Known as:
Nikto Scanner
Nikto Web Scanner is a Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software and other problems. It performs…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Cracking of wireless networks
Vulnerability scanner
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Web Server Hacking
Josh Pauli
Constructing an Ethical Hacking Knowledge Base…
2019
Corpus ID: 59769635
2019
2019
Generation of vulnerabilities and threat reports for web applications
Toni Robles Gelabert
2019
Corpus ID: 67939153
2016
2016
A Secure Management Scheme Designed in Cloud
Peng-Yu Wang
,
Ming-Quan Hong
IEEE 2nd International Conference on Big Data…
2016
Corpus ID: 17918278
At present, the security has become an important issue in the field of cloud computing. The importance and urgency of the problem…
Expand
2016
2016
Network Forensic Tools
R. Joshi
,
E. Pilli
2016
Corpus ID: 63642242
Various tools are available in the literature for doing the network forensics. In this chapter, first the network forensic…
Expand
2014
2014
A vulnerability scanning tool for session management vulnerabilities
Raymond Lukanta
,
Y. Asnar
,
A. I. Kistijantoro
International Conference on Data and Software…
2014
Corpus ID: 15274617
Session management vulnerabilities can be categorized as a group of vulnerability that is still often discovered. Session…
Expand
2014
2014
Nikto Hacker Tool
Rbcafe
2014
Corpus ID: 61132466
2010
2010
Research on the Scenario of the Active Scanning of Web Vulnerability
Li Qiang
2010
Corpus ID: 64081049
Recently,Web vulnerability scanning has an important role in network security.However,the most popular open-source web…
Expand
2009
2009
Focused N-Words and Double Negation Readings in Negative Concord Languages
M. St-Amour
2009
Corpus ID: 54794809
0. Introduction The study of negation has long been a central issue in linguistic theory, as negation is employed in every…
Expand
2007
2007
Integrated Software Vulnerability and Security Functionality Assessment
Xiangrong Wang
,
Hang Shi
,
Tze-Yau William Huang
,
F. C. Lin
IEEE International Symposium on Software…
2007
Corpus ID: 14079246
Product security is an on-going challenge for network equipment vendors. In this paper, we present a systematic methodology for…
Expand
2005
2005
Salicylany (Aspirin, Acylpyrin) na prelome tisícročí
J. Buchanec
,
J. Javorková
,
J. Buchancová
2005
Corpus ID: 99303629
Autori podavaju prehľad poznatkov o salicylanoch od antiky po dnesok. Liecivo sa sprvoti použivalo v naturalnej forme, od roku…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE