Author:
Ahuja Sachin,Johari Rahul,Khokhar Chetna
Reference17 articles.
1. https://www.owasp.org/index.php/Top_10_2013-A1-Injection
2. https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management
3. Huluka, D., Popov, O.: Root cause analysis of session management and broken authentication vulnerabilities. In: IEEE, pp. 82–86 (2012)
4. Fonseca, J., Vieira, M., Madeira, H.: Evaluation of web security mechanisms using vulnerability and attack injection. In: IEEE (2013)
5. Sadeghian, A., Zamani, M., Manaf, A.A.: A taxanomy of SQL injection detection and prevention techniques. In: IEEE, pp. 53–56 (2013)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. BDN: Biodegradable Node, Novel Approach for Routing in Delay Tolerant Network;Advances in Intelligent Systems and Computing;2017
2. Triplicative Cipher Technique;Procedia Computer Science;2016
3. CRiPT: Cryptography in Penetration Testing;Advances in Intelligent Systems and Computing;2015-09-11
4. CLCT: Cross Language Cipher Technique;Communications in Computer and Information Science;2015