1. Top 10 2013-Top 10. In: - OWASP.
https://www.owasp.org/index.php/top_10_2013-top_10
. Accessed 4 Mar 2016.
2. Common Weakness Enumeration. In: CWE - 2011 CWE/SANS Top 25 Most Dangerous Software Errors.
http://cwe.mitre.org/top25/
. Accessed 4 Mar 2016.
3. 2015 Web Application Attack Report (WAAR) - Imperva.
http://www.imperva.com/docs/hii_web_application_attack_report_ed6.pdf
. Accessed 5 Mar 2016.
4. 2015 Data Breach Investigations Report. In: Verizon Enterprise Solutions.
http://www.verizonenterprise.com/dbir/2015/
. Accessed 5 Mar 2016.
5. Shahriar H, Haddad H (2014) Risk assessment of code injection vulnerabilities using fuzzy logic-based system. Proceedings of the 29th Annual ACM Symposium on Applied Computing - SAC ‘14.