{"title":"Web应用程序安全性的实验研究","authors":"V. Strukov, Vladislav Gudilin","doi":"10.1109/aict52120.2021.9628957","DOIUrl":null,"url":null,"abstract":"The purpose of the research work is to prove the effectiveness of the method of experimental investigation of web application security, which allows for a limited time to detect the maximum possible number of vulnerabilities in the computer systems, in order to fix promptly these security problems. Based on the results of an experimental study, the authors propose methodology for identifying appropriate types of vulnerabilities for cybersecurity professionals.","PeriodicalId":375013,"journal":{"name":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Experimental Investigation of Web Application Security\",\"authors\":\"V. Strukov, Vladislav Gudilin\",\"doi\":\"10.1109/aict52120.2021.9628957\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The purpose of the research work is to prove the effectiveness of the method of experimental investigation of web application security, which allows for a limited time to detect the maximum possible number of vulnerabilities in the computer systems, in order to fix promptly these security problems. Based on the results of an experimental study, the authors propose methodology for identifying appropriate types of vulnerabilities for cybersecurity professionals.\",\"PeriodicalId\":375013,\"journal\":{\"name\":\"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/aict52120.2021.9628957\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/aict52120.2021.9628957","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Experimental Investigation of Web Application Security
The purpose of the research work is to prove the effectiveness of the method of experimental investigation of web application security, which allows for a limited time to detect the maximum possible number of vulnerabilities in the computer systems, in order to fix promptly these security problems. Based on the results of an experimental study, the authors propose methodology for identifying appropriate types of vulnerabilities for cybersecurity professionals.