{"id":"https://openalex.org/W3189611200","doi":"https://doi.org/10.1109/icaicst53116.2021.9497831","title":"Evaluation of Web Application Vulnerability Scanner for Modern Web Application","display_name":"Evaluation of Web Application Vulnerability Scanner for Modern Web Application","publication_year":2021,"publication_date":"2021-06-29","ids":{"openalex":"https://openalex.org/W3189611200","doi":"https://doi.org/10.1109/icaicst53116.2021.9497831","mag":"3189611200"},"language":"en","primary_location":{"id":"doi:10.1109/icaicst53116.2021.9497831","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaicst53116.2021.9497831","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Artificial Intelligence and Computer Science Technology (ICAICST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109545379","display_name":"Azwar Al Anhar","orcid":null},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":true,"raw_author_name":"Azwar Al Anhar","raw_affiliation_strings":["University of Indonesia, Depok, Indonesia"],"affiliations":[{"raw_affiliation_string":"University of Indonesia, Depok, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053787154","display_name":"Yohan Suryanto","orcid":"https://orcid.org/0000-0001-6896-8243"},"institutions":[{"id":"https://openalex.org/I29617571","display_name":"University of Indonesia","ror":"https://ror.org/0116zj450","country_code":"ID","type":"education","lineage":["https://openalex.org/I29617571"]}],"countries":["ID"],"is_corresponding":false,"raw_author_name":"Yohan Suryanto","raw_affiliation_strings":["University of Indonesia, Depok, Indonesia"],"affiliations":[{"raw_affiliation_string":"University of Indonesia, Depok, Indonesia","institution_ids":["https://openalex.org/I29617571"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109545379"],"corresponding_institution_ids":["https://openalex.org/I29617571"],"apc_list":null,"apc_paid":null,"fwci":3.0296,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.92413195,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"200","last_page":"204"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7259467840194702},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.7149208784103394},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.5542407631874084},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.4809919595718384},{"id":"https://openalex.org/keywords/vulnerability-management","display_name":"Vulnerability management","score":0.4773252606391907},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.4676636755466461},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44110536575317383},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4376162588596344},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.42821893095970154},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4145847260951996},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.41372326016426086},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.41018348932266235},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.3632417917251587},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3458779454231262},{"id":"https://openalex.org/keywords/psychological-resilience","display_name":"Psychological resilience","score":0.10085251927375793}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7259467840194702},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.7149208784103394},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.5542407631874084},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.4809919595718384},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.4773252606391907},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.4676636755466461},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44110536575317383},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4376162588596344},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.42821893095970154},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4145847260951996},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.41372326016426086},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.41018348932266235},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.3632417917251587},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3458779454231262},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.10085251927375793},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icaicst53116.2021.9497831","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icaicst53116.2021.9497831","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Artificial Intelligence and Computer Science Technology (ICAICST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1489243061","https://openalex.org/W1558012247","https://openalex.org/W1645120341","https://openalex.org/W1967072093","https://openalex.org/W2101306108","https://openalex.org/W2132791332","https://openalex.org/W2185917985","https://openalex.org/W2186666142","https://openalex.org/W2620487885","https://openalex.org/W2913912901","https://openalex.org/W2978958440","https://openalex.org/W3005563496","https://openalex.org/W3039344911","https://openalex.org/W3130172092","https://openalex.org/W6637217355","https://openalex.org/W6686631758","https://openalex.org/W6759145638","https://openalex.org/W6790665341"],"related_works":["https://openalex.org/W2393340519","https://openalex.org/W2390459954","https://openalex.org/W4220885008","https://openalex.org/W2057803998","https://openalex.org/W4298219515","https://openalex.org/W2021298062","https://openalex.org/W1613146948","https://openalex.org/W2185499427","https://openalex.org/W4388541873","https://openalex.org/W2103296475"],"abstract_inverted_index":{"Current":[0],"needs":[1],"and":[2,23,92,120,161,175,200],"developments":[3],"encourage":[4],"the":[5,43,50,58,62,67,122,146,181,195],"increasing":[6],"use":[7,104],"of":[8,12,52,69,130,148],"digital-based":[9],"applications.":[10,86],"One":[11],"them":[13],"is":[14,19,33,101],"a":[15,105],"web-based":[16],"application":[17,63,107,132],"that":[18,42,135,180],"easy":[20],"to":[21,37,57,79,90,103,115,118],"access":[22],"used":[24,138],"by":[25,73],"today\u2019s":[26],"society.":[27],"Along":[28],"with":[29,165],"these":[30,85],"developments,":[31],"it":[32],"common":[34],"for":[35,95,124,139,205,209],"vulnerabilities":[36,83],"exist":[38],"in":[39,81,84],"web":[40,70,106,131],"applications":[41,71],"owners":[44],"are":[45,127],"unaware":[46],"of.":[47],"It":[48],"creates":[49],"risk":[51],"data":[53],"leakage":[54],"or":[55,76,141],"damage":[56],"organization\u2019s":[59],"reputation":[60],"as":[61,156],"owner.":[64],"In":[65],"addition,":[66],"number":[68],"owned":[72],"an":[74,185],"organization":[75],"company":[77],"leads":[78],"challenges":[80],"finding":[82],"This":[87,143,177],"happened":[88],"due":[89],"time":[91],"resource":[93],"constraints":[94],"conducting":[96],"manual":[97],"assessments.":[98],"Therefore,":[99],"there":[100],"necessary":[102],"vulnerability":[108,112,133],"scanner,":[109],"which":[110],"performs":[111],"scanning":[113],"automatically,":[114],"be":[116,137],"able":[117],"help":[119],"streamline":[121],"search":[123],"vulnerabilities.":[125],"There":[126],"many":[128],"types":[129],"scanners":[134],"can":[136],"free":[140],"commercially.":[142],"study":[144,178],"evaluated":[145],"capabilities":[147],"WAVS":[149,183],"(Web":[150],"Application":[151,173],"Vulnerability":[152],"Scanners)":[153],"tools":[154],"such":[155],"OWASP":[157],"ZAP,":[158],"Wapiti,":[159],"Arachni,":[160],"Burp":[162,191],"Suite":[163,192],"Professional":[164,193],"NodeJS-based":[166],"benchmark":[167,211],"targets,":[168],"namely":[169],"Damn":[170],"Vulnerable":[171],"NodeJS":[172],"(DVNA)":[174],"NodeGoat.":[176],"found":[179],"four":[182],"have":[184],"average":[186],"f-measured":[187],"value":[188],"between":[189],"0.4-0.6.":[190],"had":[194],"best":[196],"True":[197],"Positive":[198],"(TP)":[199],"Recall":[201],"values,":[202],"while":[203],"Arachni":[204],"perfect":[206],"Precision":[207],"valued":[208],"both":[210],"targets.":[212]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2}],"updated_date":"2026-02-10T06:12:57.905455","created_date":"2025-10-10T00:00:00"}
