Developing a Methodology for Web Applications Vulnerabilities Analysis and Detection
Mohamad Ahmad Swead1, Muhammad Mazen Almustafa2
1Mohamad Ahmad Swead, Web Sciences, Syrian Virtual University, Syria.
2Muhammad Mazen Almustafa, Web Sciences, Syrian Virtual University, Syria.
Manuscript received on 07 March 2019 | Revised Manuscript received on 20 March 2019 | Manuscript published on 30 March 2019 | PP: 432-438 | Volume-8 Issue-5, March 2019 | Retrieval Number: E3047038519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Keyword: Vulnerability, SQL Injection, Encryption, Crawler, Threats, XSS, Assessment tools.
Scope of the Article: Internet and Web Applications