Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,111,802 papers from all fields of science
Search
Sign In
Create Free Account
Vulnerability scanner
Known as:
Network Reconnaissance
, Reconnaissance (disambiguation)
, Scanner
A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses. They can be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
Application security
COPS (software)
Cisco MARS
Computer program
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Discovery, Assessment and Risk Calculation Framework for Connected Automated Vehicles
Anand Mahadeorao Dhobaley
,
D. Ambawade
3rd International conference on Electronics…
2019
Corpus ID: 201832494
The key aspect of the autonomous vehicles is the connectivity establishment within the vehicles. The connectivity interfaces used…
Expand
2018
2018
OnlineKALI: Online Vulnerability Scanner
Parthajit Dholey
,
Anup Kumar Shaw
Advances in Intelligent Systems and Computing
2018
Corpus ID: 69732178
OnlineKALI is a Web framework for vulnerability assessment which allows you to quickly do a security audit of your own websites…
Expand
2017
2017
Blocking intrusions at border using software defined-internet exchange point (SD-IXP)
M. Conti
,
Ankit Gangwal
Conference on Network Function Virtualization and…
2017
Corpus ID: 620303
Servers in a network are typically assigned a static identity. Static assignment of identities is a cornerstone for adversaries…
Expand
Review
2016
Review
2016
Intent-Based Extensible Real-Time PHP Supervision Framework
Victor Prokhorenko
,
Kim-Kwang Raymond Choo
,
H. Ashman
IEEE Transactions on Information Forensics and…
2016
Corpus ID: 11747007
Protecting Web applications is increasingly important due to their high popularity and wide adoption. Therefore, a multitude of…
Expand
2015
2015
A Design of Security Assessment System for E-Commerce Website
Xia Wang
,
Ke Zhang
,
Qingtian Wu
International Symposium on Computational…
2015
Corpus ID: 15121583
According to the development speed and security issues of e-commerce Web site in today's society, analyzed the most important…
Expand
2014
2014
Secure Mobile Agents for Network Vulnerability Scanning
J. Humphries
,
C. Carver
,
U. Pooch
2014
Corpus ID: 167001413
All authors are with the Department of Computer Science, Texas A&M University, College Station, Texas 77843 (email: {jeffhump…
Expand
2012
2012
Using Multiclass Machine Learning Methods to Classify Malicious Behaviors Aimed at Web Systems
K. Goseva-Popstojanova
,
Goce Anastasovski
,
Risto Pantev
IEEE International Symposium on Software…
2012
Corpus ID: 14428633
The number of vulnerabilities and attacks on Web systems show an increasing trend and tend to dominate on the Internet…
Expand
2012
2012
Metodología para la Detección de Vulnerabilidades en Redes de Datos
D. A. Franco
,
Jorge L Perea
,
Plinio Puello
2012
Corpus ID: 110742152
El objetivo principal de este trabajo fue disenar una metodologia para la deteccion de vulnerabilidades en redes de datos. Para…
Expand
Review
2009
Review
2009
Propagation of active worms: A survey
Yang Xiang
,
Xiang Fan
,
W. Zhu
Computer systems science and engineering
2009
Corpus ID: 17497523
This paper serves worm defenders’ objective to improve their immunity to future active worms by giving them a deep insight into…
Expand
2005
2005
Automated detection of malicious reconnaissance to enhance network security
William H. Allen
,
G. Marin
,
Luis A. Rivera
Proceedings. IEEE SoutheastCon, .
2005
Corpus ID: 26478969
Anomaly detection tools currently react to directed attacks during or shortly after they have occurred. Unfortunately, an attack…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE