Analisis Deteksi Vulnerability Pada Web Server Open Journal System Menggunakan OWASP Scanner
Abstract
Full Text:
PDFReferences
Shaimaa Khalifa Mahmoud, Marco Alfonse , Mohamed Ismail Roushdy, Abdel-Badeeh M.Salem., 2017, Acomparative Analysis of Cross Site Scripting (XSS) Detecting and Defensive Techniques, Vol. 8, Ed.2, IEEE / ICICIS International Conference on Intelligent Computing and Information Systems. Cairo,Egypt.
Hua Zhang, Fang Lou, Yunsheng Fu, Zhihoung Tian,. 2017, A Conditional Probability Computation Method For Vulnerability Exploitation Based On CVSS, IEEE / Second International Conference on Data Science in Cyberspace. Institut of Computer Application, China Academy of Enginerring Physics, Mianyang, Sinhcuan, 621900, RRC.
Angkita Gupta, Kavita, Kirandeep Kaut " Vulnerability Assesment and Penetration Testing" Computer Science Departemen, PEC University of Technology, India IJETT Vol 4 Issue3- 2013.
Ahmad Budi Setiawan " peningkatan keamanan supervisiory control and Acquisiti (SCADA) Padasmart grid sebagai infastruktur kritis. kementrian komunikasi dan informatika JJPI Vol.6 No. 1 ( 2016) 59-78.
Shaimaa Khalifa Mahmoud, Mohamed Ismail Roushdy, Marco Alfonse, Abdel-Badeeh M.Salem. Acomparative Analysis of Cross Site Scripting (XSS) Detecting and Defensive Techniques. Computer Science Department, Faculty of Computer and Information Sciences. Ain Shams University. Cairo, Egypt. 2017, Vol 8.
J. Breckling, Ed., The Analysis of Directional Time Series: Applications to Wind Speed and Direction, ser. Lecture Notes in Statistics. Berlin, Germany: Springer, 1989, vol. 61.
S. Zhang, C. Zhu, J. K. O. Sin, and P. K. T. Mok, “A novel ultrathin elevated channel low-temperature poly-Si TFT,” IEEE Electron Device Lett., vol. 20, pp. 569–571, Nov. 1999.
M. Wegmuller, J. P. von der Weid, P. Oberson, and N. Gisin, “High resolution fiber distributed measurements with coherent OFDR,” in Proc. ECOC’00, 2000, paper 11.3.4, p. 109.
Maryana Yevdokymenko, Elsayed Mohamed, Paul Onwuakpa Arinze.2017. Ethical Hacking and Penetration Testing Using Raspberry PI. International Scientific-Pactical Conference, Problems of Infocommunications. Science and Technology.(PIC S&T 2017).Kharkiv National University of Radio Electronics Kharkiv, Ukraine.
Da-Yu KAO, Yu-Siang WANG, Fu-Ching TSAI, Chien-Hung CHEN.2018. Forensic Analysis of Network packets from Penetration Test Toolkits. ICACT2018. Ferbruari 11-14, 2018. International Conference on Advanced Communications Technology (ICACT). Departemen of Information Management, Central police University, Taiwan.
DOI: http://dx.doi.org/10.30872/jurti.v2i1.1319
Refbacks
- There are currently no refbacks.
Copyright (c) 2018 JURNAL REKAYASA TEKNOLOGI INFORMASI

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Alamat Redaksi :
Program Studi Informatika
Fakultas Teknik
Jl. Sambaliung No. 9 Kampus Gunung Kelua Samarinda 75119 - Kalimantan Timur
e-mail : jurti.unmul@fkti.unmul.ac.id
Url : http://e-journals.unmul.ac.id/index.php/INF
Contact Person : Medi Taruk [081543438301]
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.