Vulnerability scanner

Known as: Network Reconnaissance, Reconnaissance (disambiguation), Scanner 
A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses. They can be… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The web applications are integral part of our day to day life. Almost everything is stored and manages on web. We use web… (More)
  • figure 1
Is this relevant?
2014
2014
In the recent years, web applications have become increasingly popular for delivering security critical services. Because web… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Black-box web vulnerability scanners are a popular choice for finding security vulnerabilities in web applications in an… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These… (More)
  • table 1
  • table 2
  • figure 1
  • table 3
  • figure 3
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In… (More)
  • table I
  • figure 1
  • table II
  • figure 2
  • figure 3
Is this relevant?
2010
2010
Feature matching is an important way of network intrusion detection system. With the increasing of attack types, rule database… (More)
  • figure 1
  • figure 2
  • table IV
  • figure 3
  • table III
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Although web services are becoming business-critical components, they are often deployed with critical software bugs that can be… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2009
2009
Statistics from various sources indicate that there are roughly 75% cyber attacks occurred in the web applications, and the trend… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Web applications are typically developed with hard time constraints and are often deployed with security vulnerabilities… (More)
  • table 1
  • figure 1
  • table 2
  • table 2
  • table 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?