1. Wang, J., Shi, Y., Peng, G., et al.: Survey on key technology development and application in trusted computing. China Commun. 13(11), 70–90 (2016)
2. Shen, C., Zhang, H., Feng D., et al.: Information security overview. Scientia Sinica (Technologica) 37(1), 129–150 (2007)
3. Huanguo, Z., Jie, L., Gang, J., et al.: Development of trusted computing research. Wuhan Univ. J. Nat. Sci. 11(6), 1407–1413 (2006)
4. Brown, D., Davis, C.M., Stanlick, S.: Struts 2 in Action. Dreamtech Press, New Delhi (2008)
5. He, P., Fang, Y.: A Risk assessment model of intrusion detection for web applications based on web server logs and website parameters. Netinfo Secur. 1, 61–65 (2015)