An Advanced Algorithm and Utility for Identifying Critical Web Vulnerabilities with Exceptional Performance
Author:
Publisher
Springer Nature Singapore
Link
https://link.springer.com/content/pdf/10.1007/978-981-97-3810-6_1
Reference6 articles.
1. Ali NS (2018) Investigation framework of web applications vulnerabilities, attacks and protection techniques in structured query language injection attacks. Int J Wireless Mobile Comput 14(2):103–122. https://doi.org/10.1504/IJWMC.2018.091137
2. Antunes N, Vieira M (2015) Assessing and comparing vulnerability detection tools for web services: benchmarking approach and examples. IEEE Trans Serv Comput 8(2):269–283. https://doi.org/10.1109/TSC.2014.2310221
3. Deepa G, Thilagam PS, Khan FA et al (2018a) Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications. Int J Inf Secur 17(1):105–120. https://doi.org/10.1007/s10207-016-0359-4.Deepa; G, Thilagam PS, Praseed A et al. (2018b) DetLogic: a black-box approach for detecting logic vulnerabilities in web applications. J Netw Comput Appl 109:89–109. https://doi.org/10.1016/j.jnca.2018.01.008
4. Djuric Z (2013) A black-box testing tool for detecting SQL injection vulnerabilities. 2013 2nd international conference on informatics and applications, ICIA 2013, pp 216–221. https://doi.org/10.1109/ICoIA.2013.6650259; Dong G et al. (2014) Detecting cross site scripting vulnerabilities introduced by HTML5. 2014 11th International joint conference on computer science and software engineering: ‘human factors in computer science and software engineering’—e-science and high performance computing: eHPC, JCSSE, pp 319–323. https://doi.org/10.1109/JCSSE.2014.6841888; Doupé A et al. (2012) Enemy of the state: a state-aware black-box web vulnerability scanner. USENIX security symposium, pp 523–538 [online] https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/doupe. Accessed 18 July 2019; Fonseca J et al. (2014) Analysis of field data on web security vulnerabilities. IEEE Trans Dependable Secure Comput 11(2):89–100. https://doi.org/10.1109/TDSC; 2013.37. Fonseca J, Vieira M, Madeira H (2007) Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks. Proceedings—13th Pacific rim international symposium on dependable computing, PRDC, pp 365–372. https://doi.org/10.1109/PRDC.2007.63; Foster JC et al. (2005) Buffer overflow attacks. https://doi.org/10.1016/B978-1-932266-67-2.X5031-2
5. Goswami S et al (2017) An unsupervised method for detection of XSS attack. Int J Netw Secur 19(5):761–775. https://doi.org/10.6633/IJNS.201709.19(5).14
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3