{"id":"https://openalex.org/W4389332265","doi":"https://doi.org/10.1109/icumt61075.2023.10333274","title":"Efficient Web Application Mapping During the Reconnaissance Phase of Penetration Testing","display_name":"Efficient Web Application Mapping During the Reconnaissance Phase of Penetration Testing","publication_year":2023,"publication_date":"2023-10-30","ids":{"openalex":"https://openalex.org/W4389332265","doi":"https://doi.org/10.1109/icumt61075.2023.10333274"},"language":"en","primary_location":{"id":"doi:10.1109/icumt61075.2023.10333274","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icumt61075.2023.10333274","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011500366","display_name":"Willi Lazarov","orcid":"https://orcid.org/0000-0001-6820-8391"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Willi Lazarov","raw_affiliation_strings":["Brno University of Technology,Department of Telecommunications FEEC,Brno,Czechia","Department of Telecommunications FEEC, Brno University of Technology, Brno, Czechia"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology,Department of Telecommunications FEEC,Brno,Czechia","institution_ids":["https://openalex.org/I60587646"]},{"raw_affiliation_string":"Department of Telecommunications FEEC, Brno University of Technology, Brno, Czechia","institution_ids":["https://openalex.org/I60587646"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000738023","display_name":"Zden\u011bk Martin\u00e1sek","orcid":"https://orcid.org/0000-0002-6504-5619"},"institutions":[{"id":"https://openalex.org/I60587646","display_name":"Brno University of Technology","ror":"https://ror.org/03613d656","country_code":"CZ","type":"education","lineage":["https://openalex.org/I60587646"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Zdenek Martinasek","raw_affiliation_strings":["Brno University of Technology,Department of Telecommunications FEEC,Brno,Czechia","Department of Telecommunications FEEC, Brno University of Technology, Brno, Czechia"],"affiliations":[{"raw_affiliation_string":"Brno University of Technology,Department of Telecommunications FEEC,Brno,Czechia","institution_ids":["https://openalex.org/I60587646"]},{"raw_affiliation_string":"Department of Telecommunications FEEC, Brno University of Technology, Brno, Czechia","institution_ids":["https://openalex.org/I60587646"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011500366"],"corresponding_institution_ids":["https://openalex.org/I60587646"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28497419,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"146","last_page":"151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/web-testing","display_name":"Web testing","score":0.7925778031349182},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.783141016960144},{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.5997019410133362},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.5552260875701904},{"id":"https://openalex.org/keywords/penetration","display_name":"Penetration (warfare)","score":0.5127204656600952},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3594006299972534},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.33614736795425415},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2898622453212738},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.26278990507125854},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.26103925704956055},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.19148504734039307},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13970783352851868}],"concepts":[{"id":"https://openalex.org/C42989059","wikidata":"https://www.wikidata.org/wiki/Q7978626","display_name":"Web testing","level":5,"score":0.7925778031349182},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.783141016960144},{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.5997019410133362},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.5552260875701904},{"id":"https://openalex.org/C80107235","wikidata":"https://www.wikidata.org/wiki/Q7162625","display_name":"Penetration (warfare)","level":2,"score":0.5127204656600952},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3594006299972534},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.33614736795425415},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2898622453212738},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26278990507125854},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.26103925704956055},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.19148504734039307},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13970783352851868},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icumt61075.2023.10333274","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icumt61075.2023.10333274","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2713294293","display_name":null,"funder_award_id":"VK01030019","funder_id":"https://openalex.org/F4320311333","funder_display_name":"Ministerstvo Vnitra \u010cesk\u00e9 Republiky"}],"funders":[{"id":"https://openalex.org/F4320311333","display_name":"Ministerstvo Vnitra \u010cesk\u00e9 Republiky","ror":"https://ror.org/05w1nn565"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2033742178","https://openalex.org/W2973105839","https://openalex.org/W3213888231","https://openalex.org/W4312903757","https://openalex.org/W6694940939"],"related_works":["https://openalex.org/W2350300534","https://openalex.org/W2365828106","https://openalex.org/W2369571370","https://openalex.org/W643057374","https://openalex.org/W2364392443","https://openalex.org/W2381625382","https://openalex.org/W2362190997","https://openalex.org/W4249792249","https://openalex.org/W2081020445","https://openalex.org/W2003115932"],"abstract_inverted_index":{"This":[0],"paper":[1,64],"presents":[2],"the":[3,14,38,51,69,92],"ptwebdiscover,":[4],"an":[5],"advanced":[6],"tool":[7],"designed":[8],"for":[9,45,60],"web":[10,80,101],"application":[11,81,102],"mapping":[12],"in":[13,57],"reconnaissance":[15],"phase":[16],"of":[17,40],"penetration":[18,82,103],"testing.":[19,104],"Unlike":[20],"most":[21],"available":[22],"tools,":[23],"it":[24],"operates":[25],"using":[26],"multiple":[27],"threads,":[28],"boasts":[29],"modularity,":[30],"and":[31,50,76],"enhances":[32],"testing":[33,83],"capabilities.":[34],"Notable":[35],"features":[36],"include":[37],"implementation":[39],"a":[41,96],"brute":[42],"force":[43],"method":[44],"searching":[46],"shorter":[47],"file":[48],"names":[49],"ability":[52],"to":[53],"mark":[54],"specific":[55],"locations":[56],"tested":[58],"URLs":[59],"string":[61],"insertion.":[62],"The":[63],"provides":[65],"comprehensive":[66],"details":[67],"about":[68],"tool's":[70],"multi-threaded":[71],"implementation,":[72],"intelligent":[73],"backup":[74],"searches,":[75],"comparisons":[77],"with":[78],"other":[79],"tools.":[84],"Furthermore,":[85],"ptwebdiscover":[86],"has":[87],"been":[88],"seamlessly":[89],"integrated":[90],"into":[91],"Penterep":[93],"platform,":[94],"providing":[95],"significant":[97],"advantage":[98],"during":[99],"manual":[100]},"counts_by_year":[],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
