Publisher
Springer International Publishing
Reference11 articles.
1. Bland, J.A., Petty, M.D., Whitaker, T.S., Maxwell, K.P., Cantrell, W.A.: Machine learning cyberattack and defense strategies. Comput. Secur. 92, 101,738 (2020). https://doi.org/10.1016/j.cose.2020.101738. https://www.sciencedirect.com/science/article/pii/S0167404818309799
2. Doupé, A., Cui, W., Jakubowski, M.H., Peinado, M., Kruegel, C., Vigna, G.: deDacota: toward preventing server-side XSS via automatic code and data separation. In: Sadeghi, A., Gligor, V.D., Yung, M. (eds.) 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4–8 November 2013, pp. 1205–1216. ACM (2013). https://doi.org/10.1145/2508859.2516708
3. Jaballah, W.B., Kheir, N.: A grey-box approach for detecting malicious user interactions in web applications. In: You, I., Bertino, E., (eds.) Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST@CCS 2016, Vienna, Austria, 28 October 2016, pp. 1–12. ACM (2016). http://dl.acm.org/citation.cfm?id=2995966
4. Lekies, S., Stock, B., Johns, M.: 25 million flows later: large-scale detection of DOM-based XSS. In: Sadeghi, A., Gligor, V.D., Yung, M. (eds.) 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4–8 November 2013, pp. 1193–1204. ACM (2013). https://doi.org/10.1145/2508859.2516703
5. Liu, M., Wang, B.: A web second-order vulnerabilities detection method. IEEE Access 6, 70,983–70,988 (2018). https://doi.org/10.1109/ACCESS.2018.2881070
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献