WIVET - Benchmarking Coverage Qualities of Web Crawlers
暂无分享,去创建一个
[1] Bengt Jonsson,et al. Regular Inference for State Machines Using Domains with Equality Tests , 2008, FASE.
[2] Benjamin Livshits. Defining a Set of Common Benchmarks for Web Application Security , 2005 .
[3] Marco Vieira,et al. Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks , 2007 .
[4] Jayant Madhavan,et al. Google's Deep Web crawl , 2008, Proc. VLDB Endow..
[5] Marco Vieira,et al. Benchmarking Vulnerability Detection Tools for Web Services , 2010, 2010 IEEE International Conference on Web Services.
[6] Shian-Shyong Tseng,et al. W-VST: A Testbed for Evaluating Web Vulnerability Scanner , 2014, 2014 14th International Conference on Quality Software.
[7] Peter Kok Keong Loh,et al. Fuzzy Classification Metrics for Scanner Assessment and Vulnerability Reporting , 2010, IEEE Transactions on Information Forensics and Security.
[8] Christopher Krügel,et al. Pixy: a static analysis tool for detecting Web application vulnerabilities , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[9] M. Alvarez,et al. Client-side deep Web data extraction , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.
[10] Laurie A. Williams,et al. One Technique is Not Enough: A Comparison of Vulnerability Discovery Techniques , 2011, 2011 International Symposium on Empirical Software Engineering and Measurement.
[11] Christopher Krügel,et al. Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner , 2012, USENIX Security Symposium.
[12] Eric Medvet,et al. Recording and Replaying Navigations on AJAX Web Sites , 2012, ICWE.
[13] Aleksandra Mileva,et al. EVALUATION AND TESTING OF SEVERAL FREE/OPEN SOURCE WEB VULNERABILITY SCANNERS , 2013 .
[14] Pavol Zavarsky,et al. Testing and assessing web vulnerability scanners for persistent SQL injection attacks , 2011, IWSEC 2011.
[15] John C. Mitchell,et al. State of the Art: Automated Black-Box Web Application Vulnerability Testing , 2010, 2010 IEEE Symposium on Security and Privacy.
[16] Ken Moody,et al. SharpSpider: spidering the Web through Web services , 2003, Proceedings of the IEEE/LEOS 3rd International Conference on Numerical Simulation of Semiconductor Optoelectronic Devices (IEEE Cat. No.03EX726).
[17] Arie van Deursen,et al. Crawling Ajax-Based Web Applications through Dynamic Analysis of User Interface State Changes , 2012, TWEB.
[18] Juliana Freire,et al. An adaptive crawler for locating hidden-Web entry points , 2007, WWW '07.
[19] Arie van Deursen,et al. Invariant-Based Automatic Testing of Modern Web Applications , 2012, IEEE Transactions on Software Engineering.
[20] Christopher Krügel,et al. SecuBat: a web vulnerability scanner , 2006, WWW '06.
[21] Victor Carneiro,et al. Crawling the Content Hidden Behind Web Forms , 2007, ICCSA.
[22] Toshinori Sato,et al. Power-Performance Trade-Off of a Dependable Multicore Processor , 2007 .
[23] Giovanni Vigna,et al. Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners , 2010, DIMVA.