Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,000,559 papers from all fields of science
Search
Sign In
Create Free Account
Security AppScan
Known as:
IBM Security AppScan
, Appscan
, IBM Rational AppScan
Expand
IBM Security AppScan, previously known as IBM Rational AppScan, is a family of web security testing and monitoring tools from the Rational Software…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Application firewall
Desktop metaphor
List of tools for static code analysis
Test management
Broader (1)
Software testing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Towards Better Utilizing Static Application Security Testing
Jinqiu Yang
,
Lin Tan
,
John Peyton
,
Kristofer A. Duer
IEEE/ACM 41st International Conference on…
2019
Corpus ID: 184483574
Static application security testing (SAST) detects vulnerability warnings through static program analysis. Fixing the…
Expand
2019
2019
Security and Privacy in Social Networks and Big Data: 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers
Phoebe Chen
,
A. Cuzzocrea
,
+10 authors
S. Furnell
International Symposium on Security and Privacy…
2019
Corpus ID: 204848794
Web scanners will not only take up the bandwidth of the server, but also collect sensitive information of websites and probe…
Expand
2018
2018
The Research of Information Security for The Education Cloud Platform Based on AppScan Technology
Wei Nie
,
Xiangfei Xiao
,
Zhaohui Wu
,
Yuanhui Wu
,
F. Shen
,
Xionglan Luo
International Conference on Cyber Security and…
2018
Corpus ID: 51882617
For the online education, remote education resources sharing and resource integration issues?according to the cloud computing…
Expand
2014
2014
Hybrid security analysis of web JavaScript code via dynamic partial evaluation
Omer Tripp
,
Pietro Ferrara
,
Marco Pistoia
International Symposium on Software Testing and…
2014
Corpus ID: 15940350
This paper addresses the problem of detecting JavaScript security vulnerabilities in the client side of Web applications. Such…
Expand
Highly Cited
2013
Highly Cited
2013
Highly precise taint analysis for Android applications
Christian Fritz
,
Steven Arzt
,
+6 authors
P. Mcdaniel
2013
Corpus ID: 14393105
Today’s smart phones are a ubiquitous source of private and confidential data. At the same time, smartphone users are plagued by…
Expand
2013
2013
WS-S Evaluation Based on User Preferences and Ranking Mechanism
Cheng Ma
,
Youxiang Duan
,
Xinglong Ju
,
Fuchang Xu
International Conference on Cyber-Enabled…
2013
Corpus ID: 873390
As information security is so important today, the technology of web services security is also becoming more and more important…
Expand
2013
2013
Finding your way in the testing jungle: a learning approach to web security testing
Omer Tripp
,
Omri Weisman
,
L. Guy
International Symposium on Software Testing and…
2013
Corpus ID: 1229715
Black-box security testing of web applications is a hard problem. The main complication lies in the black-box assumption: The…
Expand
Review
2012
Review
2012
Crawling rich internet applications: the state of the art
Suryakant Choudhary
,
Mustafa Emre Dincturk
,
+4 authors
Iosif-Viorel Onut
Conference of the Centre for Advanced Studies on…
2012
Corpus ID: 17141476
Web applications have come a long way, both in terms of adoption to provide information and services, and in terms of the…
Expand
Review
2009
Review
2009
WEB APPLICATION SECURITY INSTRUCTIONAL PARADIGMS AND THE IS CURRICULUM
J. P. Laverty
,
John J. Scarpino
2009
Corpus ID: 61286388
This document provides an overview of the growing importance of web application security threats and its role in the IS security…
Expand
2006
2006
Quantitative Evaluation of Systems with Security Patterns Using a Fuzzy Approach
Spyros T. Halkidis
,
A. Chatzigeorgiou
,
G. Stephanides
OTM Workshops
2006
Corpus ID: 10505255
The importance of Software Security has been evident, since it has been shown that most attacks to software systems are based on…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE