Author:
Gupta Shashank,Gupta B. B.
Publisher
Springer Science and Business Media LLC
Reference104 articles.
1. Acunetix Web Application Vulnerability Report (2015)
http://www.acunetix.com/acunetix-web-application-vulnerability-report-2015/
2. Agten P, Van Acker S, Brondsema Y, Phung PH, Desmet L, Piessens F (2012) JSand: complete client-side sandboxing of third-party JavaScript without browser modifications. In: Proceedings of the 28th ACM annual computer security applications conference. pp 1–10
3. AlShahwan F, Faisal M, Ansa G (2016) Security framework for RESTful mobile cloud computing web services. J Ambient Intell Hum Comput 7(5):649–659.
https://doi.org/10.1007/s12652-015-0308-5
4. Balzarotti D, Cova M, Felmetsger VV, Vigna G (2007) Multi-module vulnerability analysis of web-based applications. In Proceedings of the 14th ACM conference on computer and communications security. pp 25–35
5. Balzarotti D, Cova M, Felmetsger V, Jovanovic N, Kirda E, Kruegel C, Vigna G (2008) Saner: composing static and dynamic analysis to validate sanitization in web applications. In: IEEE symposium on security and privacy, 2008. SP 2008. pp 387–401
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献