Author:
Mao Ziqing,Li Ninghui,Molloy Ian
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. The platform for privacy preferences project (p3p), http://www.w3.org/TR/P3P
2. The web hacking incidents database (2008), http://www.webappsec.org/projects/whid/byid_id_2008-05.shtml
3. Barth, A., Jackson, C., Mitchell, J.C.: Robust defenses for cross-site request forgery. In: Proc. ACM Conference on Computer and Communications Security (CCS) (October 2008)
4. Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A., Stewart, L.: HTTP authentication: Basic and digest access authentication. RFC 2617 (June 1999), http://www.ietf.org/rfc/rfc2617.txt
5. Google. Load time analyzer 1.5, firefox add-on (March 2007), https://addons.mozilla.org/en-US/firefox/addon/3371
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Deep learning trends and future perspectives of web security and vulnerabilities;Journal of High Speed Networks;2024-01-10
2. The Outcome of Social Media User Behavior on Safety and Secrecy Pressures;Lecture Notes in Electrical Engineering;2024
3. Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications;2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech);2023-11-14
4. A Survey Paper on Browser Extensions to Detect Web Attacks;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06
5. A URL-Based Social Semantic Attacks Detection With Character-Aware Language Model;IEEE Access;2023