An empirical comparison of commercial and open‐source web vulnerability scanners
Web vulnerability scanners (WVSs) are tools that can detect security vulnerabilities in web services. Although both commercial and open-source WVSs exist, their vulnerability detection capability and performance vary. In this article, we report on a comparative study to determine the vulnerability d...
| Main Authors: | Amankwah, Richard, Chen, Jinfu, Kudjo, Patrick Kwaku, Towey, Dave |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/61145/ |
Similar Items
Automated registration of unorganised point clouds from terrestrial laser scanners
by: Bae, Kwang-Ho
Published: (2006)
by: Bae, Kwang-Ho
Published: (2006)
Worst-input mutation approach to web services vulnerability testing based on SOAP messages
by: Chen, Jinfu, et al.
Published: (2014)
by: Chen, Jinfu, et al.
Published: (2014)
Estimating porosity from CT scans of high permeability core plugs
by: Squelch, Andrew, et al.
Published: (2012)
by: Squelch, Andrew, et al.
Published: (2012)
Paddy growth monitoring and yield estimation using terrestrial laser scanner
by: Zulkifl, Zareen
Published: (2016)
by: Zulkifl, Zareen
Published: (2016)
Modelling of an inexpensive 9M satellite dish from 3D point clouds captured by terrestrial laser scanners
by: Belton, David, et al.
Published: (2011)
by: Belton, David, et al.
Published: (2011)
Protecting vulnerable consumers from aggressive commercial practices
by: Kaprou, Eleni
Published: (2018)
by: Kaprou, Eleni
Published: (2018)
Poverty, vulnerability, and child labour: evidence from Uganda
by: Angemi, Diego
Published: (2008)
by: Angemi, Diego
Published: (2008)
Supply Chain Resilience to Mitigate Disruptions: A QFD Approach
by: Chowdhury, Md. Maruf Hossan, et al.
Published: (2012)
by: Chowdhury, Md. Maruf Hossan, et al.
Published: (2012)
Understanding and protecting vulnerable financial consumers
by: Cartwright, Peter
Published: (2015)
by: Cartwright, Peter
Published: (2015)
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
by: Koh, Johnny Siaw Paw, et al.
Published: (2006)
by: Koh, Johnny Siaw Paw, et al.
Published: (2006)
Dose reduction using care dose4d technique of siemens dual-source computed tomography on pediatric congenital heart disease
by: Chen, HongYing
Published: (2022)
by: Chen, HongYing
Published: (2022)
The value of vulnerability: the transformative capacity of risky trust
by: Bruni, Luigino, et al.
Published: (2017)
by: Bruni, Luigino, et al.
Published: (2017)
A scanner-based rhizobox system enabling the quantification
of root system development and response of Brassica rapa seedlings to external P availability
by: Adu, Michael Osei, et al.
Published: (2017)
by: Adu, Michael Osei, et al.
Published: (2017)
Laboratory test and numerical simulation of laminated glass window vulnerability to debris impact
by: Zhang, X., et al.
Published: (2013)
by: Zhang, X., et al.
Published: (2013)
Groundwater vulnerability to pesticides in Northwest Bangladesh
by: Anwar, Faisal, et al.
Published: (2013)
by: Anwar, Faisal, et al.
Published: (2013)
A Health Impact Assessment Framework for Assessing Vulnerability and Adaptation Planning for Climate Change
by: Brown, Helen, et al.
Published: (2014)
by: Brown, Helen, et al.
Published: (2014)
Supply vulnerability of natural gas?importing countries in Asia
by: Cabalu, Helen, et al.
Published: (2008)
by: Cabalu, Helen, et al.
Published: (2008)
Livelihood and vulnerability in the wake of Typhoon Yolanda: lessons of community and resilience
by: Eadie, Pauline, et al.
Published: (2020)
by: Eadie, Pauline, et al.
Published: (2020)
The effect of humour during investigative interviewing in forensic settings
by: Mason, Matthew
Published: (2020)
by: Mason, Matthew
Published: (2020)
Understanding Vulnerability: Exploring a Person Centred Perspective
by: Gledhill, Clare
Published: (2022)
by: Gledhill, Clare
Published: (2022)
Spatial mapping of heat vulnerability in Abuja, the capital city of Nigeria
by: Joshua, Jonah Kunda
Published: (2023)
by: Joshua, Jonah Kunda
Published: (2023)
Corporate social responsibility and the parameters of dialogue with vulnerable others
by: Mayes, Robyn, et al.
Published: (2013)
by: Mayes, Robyn, et al.
Published: (2013)
Corporate social responsibility and the parameters of dialogue with vulnerable others
by: Mayes, Robyn, et al.
Published: (2012)
by: Mayes, Robyn, et al.
Published: (2012)
Safe spaces, support, social capital: a critical analysis of artists working with vulnerable young people in educational contexts
by: Sellman, Edward
Published: (2015)
by: Sellman, Edward
Published: (2015)
Diluting substantive equality: why the UK government doesn't know if its welfare reforms promote equality
by: Roberts, Simon, et al.
Published: (2017)
by: Roberts, Simon, et al.
Published: (2017)
Virtual Penetration Testing: A Joint Education Exercise across Geographic Borders
by: Armstrong, Helen, et al.
Published: (2013)
by: Armstrong, Helen, et al.
Published: (2013)
Detection and localisation of structural deformations using terrestrial laser scanning and generalised procrustes analysis
by: Jaafar, Hasan Abdulhussein
Published: (2017)
by: Jaafar, Hasan Abdulhussein
Published: (2017)
HIV Vulnerability in Out-of-School Adolescents and Youth in Yunnan, China
by: Li, Jianghong, et al.
Published: (2012)
by: Li, Jianghong, et al.
Published: (2012)
Tobacco smoking, associated risk behaviours, and experience with quitting: a qualitative study with homeless smokers addicted to drugs and alcohol
by: Garner, Laura, et al.
Published: (2013)
by: Garner, Laura, et al.
Published: (2013)
Institutional abuse – characteristics of victims, perpetrators and organsations: a systematic review
by: Kamavarapu, Y.S., et al.
Published: (2016)
by: Kamavarapu, Y.S., et al.
Published: (2016)
Assessment of the effectiveness of investment strategy in solar photovoltaic (PV) energy sector: a case study
by: Zhang, Xingxing, et al.
Published: (2017)
by: Zhang, Xingxing, et al.
Published: (2017)
Identifying the metabolic 'Achilles heel' of adult and paediatric glioblastoma multiforme
by: Wood, James
Published: (2019)
by: Wood, James
Published: (2019)
Income poverty and well-being among vulnerable households: a study in Malaysia
by: Ahmad, Nor Fairani, et al.
Published: (2016)
by: Ahmad, Nor Fairani, et al.
Published: (2016)
All-hazard emergency preparedness: an assessment of the hazard vulnerability and response capacity of secondary and tertiary hospitals in Riyadh Region, Saudi Arabia
by: Hajjam, Roaa
Published: (2024)
by: Hajjam, Roaa
Published: (2024)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Extreme weather and social vulnerability in colonial Antigua, Lesser Antilles, 1770-1890
by: Berland, Alexander Jorge
Published: (2015)
by: Berland, Alexander Jorge
Published: (2015)
GNSS jamming resilience for close to shore navigation in the Northern Sea
by: Glomsvoll, Oeystein, et al.
Published: (2017)
by: Glomsvoll, Oeystein, et al.
Published: (2017)
Conceptualising Elder Abuse: Does this Label Fit?
by: Clare, M., et al.
Published: (2014)
by: Clare, M., et al.
Published: (2014)
International aid and cyclone shelters in Bangladesh: adaptation or maladaptation?
by: Dhakal, Subas P., et al.
Published: (2014)
by: Dhakal, Subas P., et al.
Published: (2014)
HoneySpam 2.0: profiling web spambot behaviour
by: Hayati, Pedram, et al.
Published: (2009)
by: Hayati, Pedram, et al.
Published: (2009)
Similar Items
-
Automated registration of unorganised point clouds from terrestrial laser scanners
by: Bae, Kwang-Ho
Published: (2006) -
Worst-input mutation approach to web services vulnerability testing based on SOAP messages
by: Chen, Jinfu, et al.
Published: (2014) -
Estimating porosity from CT scans of high permeability core plugs
by: Squelch, Andrew, et al.
Published: (2012) -
Paddy growth monitoring and yield estimation using terrestrial laser scanner
by: Zulkifl, Zareen
Published: (2016) -
Modelling of an inexpensive 9M satellite dish from 3D point clouds captured by terrestrial laser scanners
by: Belton, David, et al.
Published: (2011)