Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,849,642 papers from all fields of science
Search
Sign In
Create Free Account
Security testing
Security testing is a process intended to reveal flaws in the security mechanisms of an information system that protect data and maintain…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
API testing
Access control
Burp suite
Continuous testing
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Analysis of organizations IPv6 deployment strategies in Nigeria and evaluating suitable transition mechanisms
Mohammed F. Suleiman
,
Julien Cordry
IEEE Advanced Information Technology, Electronic…
2017
Corpus ID: 37713108
Due to the continuous growth of the Internet, current internet communication protocol (IPv4) is no longer sufficient for the…
Expand
2016
2016
Design Space Exploration for Security
Eunsuk Kang
IEEE Cybersecurity Development
2016
Corpus ID: 12994592
Design space exploration involves identifying a set of design decisions, and evaluating their potential impact on various…
Expand
2012
2012
SAGE
Patrice Godefroid
,
Michael Y. Levin
,
Dávid Molnár
Communications of the ACM
2012
Corpus ID: 247159408
SAGE has had a remarkable impact at Microsoft.
2010
2010
Security Testing by Telling TestStories
M. Felderer
,
B. Agreiter
,
R. Breu
,
Á. Armenteros
Modellierung
2010
Corpus ID: 18530524
Security testing is very important to assure a certain level of reliability in a system. On the system level, security testing…
Expand
2010
2010
Stateful Web Service Robustness
S. Salva
,
I. Rabhi
Fifth International Conference on Internet and…
2010
Corpus ID: 18095304
Web Services fall under the so-called emerging technologies category and are getting more and more used for Internet applications…
Expand
Review
2007
Review
2007
Testing Code Security
M. V. D. Linden
2007
Corpus ID: 61601240
Introduction Why Is This Book Being Written? Why Am I Writing This Book Goals of This Book Intended Audience How This Book Is…
Expand
2007
2007
An Approach for WSDL-Based Automated Robustness Testing of Web Services
Samer Hanna
,
M. Munro
Integrated Spatial Databases
2007
Corpus ID: 28561434
Web Services are considered a new paradigm for building software applications that has many advantages over the previous…
Expand
2006
2006
Wavelet based Denial-of-Service detection
G. Carl
,
R. Brooks
,
S. Rai
Computers & security
2006
Corpus ID: 46312339
2006
2006
Security vulnerability categories in major software systems
Omar H. Alhazmi
,
Sung-Whan Woo
,
Y. Malaiya
Communication, Network, and Information Security
2006
Corpus ID: 8257451
The security vulnerabilities in software systems can be categorized by either the cause or severity. Several software…
Expand
2005
2005
Security Requirements---A Field Study of Current Practice
John Wilander
,
Jens Gustavsson
2005
Corpus ID: 8833422
The number of security flaws in software is a costly problem. In 2004 more than ten new security vulnerabilities were found in…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE