Models and scenarios of implementation of threats for internet resources
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection. But these tools for the most part can only identify problems, and they are not capable of fixin...
Saved in:
Main Author: | S. A. Lesko |
---|---|
Format: | Article |
Language: | Russian |
Published: |
MIREA - Russian Technological University
2020-12-01
|
Series: | Российский технологический журнал |
Subjects: | |
Online Access: | https://www.rtj-mirea.ru/jour/article/view/255 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
WEB VULNERABILITIES DETECTION USING A HYBRID MODEL OF CNN, GRU AND ATTENTION MECHANISM
by: Sarbast H. Ali, et al.
Published: (2025-01-01) -
Rule-defect oriented browser XSS filter test method
by: Zhijie GUI, et al.
Published: (2018-11-01) -
Research on the SQL injection filtering based on SQL syntax tree
by: Chen-wang HAN, et al.
Published: (2016-11-01) -
Discovery and research of network security vulnerabilities based on Web application
by: Xiao-shuang ZHANG, et al.
Published: (2016-06-01) -
SOLUTIONS FOR AUTO-TESTING AND AUTO-WARNING WEBSITE ERRORS BASED ON THE RESULTS OF THE WEBSITE ERROR SCANNING TOOLS
by: Phạm Duy Lộc, et al.
Published: (2016-06-01)