Author:
De Ryck Philippe,Desmet Lieven,Joosen Wouter,Piessens Frank
Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. Akhawe, D., Barth, A., Lam, P.E., Mitchell, J., Song, D.: Towards a formal foundation of web security. In: IEEE Computer Security Foundations Symposium, pp. 290–304 (2010)
2. Barth, A., Jackson, C., Hickson, I.: The web origin concept (November 2010),
http://tools.ietf.org/html/draft-abarth-origin-09
3. Barth, A., Jackson, C., Mitchell, J.C.: Robust defenses for cross-site request forgery. In: 15th ACM Conference on Computer and Communications Security, CCS 2008 (2008)
4. Burns, J.: Cross site reference forgery: An introduction to a common web application weakness. In: Security Partners, LLC (2005)
5. Lecture Notes in Computer Science;P. Ryck De,2010
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Survey: Network Attack Detection and Mitigation Techniques;Lecture Notes in Networks and Systems;2024
2. Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications;2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech);2023-11-14
3. Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation;International Journal of Information Security;2023-02-17
4. Developing Security Recommender System Using Content-Based Filtering Mechanisms;Information Technology for Education, Science, and Technics;2023
5. Enhancing Web Authentication Security Using Random Forest;TENCON 2022 - 2022 IEEE Region 10 Conference (TENCON);2022-11-01