References
[3]. Al Awaida, S. A., Al-Shargabi, B., & Al-Rousan, T.
(2019). Automated arabic essay grading system based
on f-score and arabic worldnet. Jordanian Journal of
Computers and Information Technology, 5(3), 170-180.
[4]. Al-Rousan, T., Sulaiman, S., & Salam, R. A. (2009). Risk
analysis and web project management. Journal of
Software, 4(6), 614-621.
[5]. Al-Rouson, T., Sulaimin, S., & Salam, R. A. (2009).
Supporting architectural design decision through risk
identification architecture pattern (RIAP) model. WSEAS
Transactions on Information Science and Applications,
6(4), 611-620.
[8].
Ban, G., Xu, L., Xiao, Y., Li, X., Yuan, Z., & Huo, W.
(2021). B2SMatcher: Fine-Grained version identification
of open-Source software in binary files. Cybersecurity,
4(1), 1-21.
[10].
Cao, S., Sun, X., Bo, L., Wei, Y., & Li, B. (2021).
Bgnn4vd: Constructing bidirectional graph neuralnetwork for vulnerability detection. Information and
Software Technology, 136, 106576.
[12]. De Ryck, P., Desmet, L., Piessens, F., & Johns, M.
(2014). Primer on Client-Side Web Security. Springer.
[18].
Huang, Y. W., Tsai, C. H., Lin, T. P., Huang, S. K., Lee, D.
T., & Kuo, S. Y. (2005). A testing framework for web
application security assessment. Computer Networks,
48(5), 739-761.
[19]. Idrissi, S. E., Berbiche, N., Guerouate, F., & Shibi, M. (2017). Performance evaluation of web application
security scanners for prevention and protection against
vulnerabilities. International Journal of Applied
Engineering Research, 12(21), 11068-11076.
[24].
Meeus, W., Van Beeck, K., Goedemé, T., Meel, J., &
Stroobandt, D. (2012). An overview of today's high-level
synthesis tools. Design Automation for Embedded
Systems, 16, 31-51.
[25]. Mohammed, R. (2016). Assessment of web scanner
tools. International Journal of Computer Applications,
133(5), 1-4.
[27]. Nidhra, S., & Dondeti, J. (2012). Black box and white
box testing techniques-A literature review. International
Journal of Embedded Systems and Applications (IJESA),
2(2), 29-50.
[30].
Palsetia, N., Deepa, G., Khan, F. A., Thilagam, P. S., &
Pais, A. R. (2016). Securing native XML database-driven
web applications from XQuery injection vulnerabilities.
Journal of Systems and Software, 122, 93-109.
[32].
Roy, S., Sharmin, N., Acosta, J. C., Kiekintveld, C., &
Laszka, A. (2022). Survey and taxonomy of adversarial
reconnaissance techniques. ACM Computing Surveys,
55(6), 1-38.
[34]. Suto, L. (2007). Analyzing the effectiveness and
coverage of web application security scanners. In
Conference on Web Application Security, San Francisco.
[35].
Tripp, O., Pistoia, M., Cousot, P., Cousot, R., &
Guarnieri, S. (2013). Andromeda: Accurate and scalable
security analysis of web applications. In Fundamental
Approaches to Software Engineering (pp. 210-225).
Springer, Berlin Heidelberg.
[36]. Trost, A., & Zemva, A. (2019). A web-based tool for
learning digital circuit high-level modeling. International
Journal of Engineering Education, 35(4), 1224-1237.
[37].
Xu, X., Zheng, Q., Yan, Z., Fan, M., Jia, A., & Liu, T.
(2021, May). Interpretation-enabled software reuse
detection based on a multi-level birthmark model. In
2021 IEEE/ACM 43rd International Conference on
Software Engineering (ICSE) (pp. 873-884). IEEE.