Bijjou, 2019
| Publication | Publication Date | Title |
|---|---|---|
| EP3188436B1 (en) | Platform for protecting small and medium enterprises from cyber security threats | |
| Stasinopoulos et al. | Commix: automating evaluation and exploitation of command injection vulnerabilities in web applications | |
| US10313370B2 (en) | Generating malware signatures based on developer fingerprints in debug information | |
| US20150121532A1 (en) | Systems and methods for defending against cyber attacks at the software level | |
| Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
| Riadi et al. | Vulnerability analysis of E-voting application using open web application security project (OWASP) framework | |
| Calzavara et al. | Testing for integrity flaws in web sessions | |
| Sharif | Web attacks analysis and mitigation techniques | |
| Djeki et al. | Preventive measures for digital learning spaces’ security issues | |
| Kollepalli et al. | An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications. | |
| Tyler et al. | Towards Browser Controls to Protect Cookies from Malicious Extensions | |
| Orucho et al. | Security threats affecting user-data on transit in mobile banking applications: A review | |
| Sheikh | Certified Ethical Hacker (CEH) Preparation Guide | |
| Bijjou | Web Application Firewall Bypassing: An Approach for Penetra | |
| Pradhana | Website Security Analysis Using the OWASP10 Method (Case Study: almumtazparfumebatam. store) | |
| MEHARU | WEB SECURITY VULNERABILITY ANALYSIS IN SELECTED ETHIOPIAN GOVERNMENTAL OFFICES (USING WHITE BOX AND BLACK BOX TESTING) | |
| Nilsson et al. | Vulnerability scanners | |
| Yu et al. | Trustworthy web services based on testing | |
| Widyasuri et al. | Security Analysis of Audit Tools | |
| Bypassing | Magdeburger Journal zur Sicherheitsforschung | |
| Bernardo | Targeted attack detection by means of free and open source solutions | |
| Gupta | Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh | |
| Gula et al. | Performing PCI DSS and OWASP Web Application Audits with Nessus | |
| Javed | Internet of Things Hacking: Ethical Hacking of a Smart Camera | |
| Alavi et al. | Where is the weakest link? a study on security discrepancies between android apps and their website counterparts |