Author:
Hussain Syed Zeeshan,Agarwal Nancy
Reference19 articles.
1. Hayati, P., Potdar, V.: Spammer and hacker, two old friends. In: Proceedings of the International Conference on Digital Ecosystems and Technologies (DEST 2009), pp. 290–294. IEEE (2009)
2. Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013)
3. Agarwal, N., Hussain, S.Z.: A closer look at intrusion detection system for web applications. Secur. Commun. Netw. 2018, 27 (2018).
https://doi.org/10.1155/2018/9601357
. Article ID 9601357
4. WhiteHat Security: Application Security Statistic Report (2017).
https://info.whitehatsec.com/rs/675-YBI-674/images/WHS%202017%20Application%20Security%20Report%20FINAL.pdf
. Accessed 10 Oct 2018
5. OWASP Top 10 Application Security Risks.
https://www.owasp.org/index.php/Top_10-2017_Top_10
. Accessed 10 Oct 2018