Vulnerability Assessment for Applications Security Through Penetration Simulation and Testing.
Petar LachkovLo'ai TawalbehSmriti BhattPublished in: J. Web Eng. (2022)
Keyphrases
- risk assessment
- penetration testing
- security vulnerabilities
- information security
- network security
- simulation model
- buffer overflow
- mathematical model
- security issues
- access control
- security analysis
- intrusion detection
- database
- security requirements
- human operators
- security mechanisms
- simulation models
- statistical databases
- security systems
- security level
- software systems
- fault injection
- information assurance