1. M. Almorsy, J. Grundy, I. Mueller, “An analysis of the cloud computing security problem,” In the proc. of the 2010 Asia Pacific Cloud Workshop, Colocated with APSEC2010, Australia, 2010.
2. Cross-Site Scripting (XSS) Abuse and Defense: Exploitation on Several Testing Bed Environments and its Defense;Gupta;Special Issue of Secured Communication in Wireless and Wired Networks in Journal of Information Privacy and Security, Taylor & Francis Online,2015
3. Shashank Gupta, B.B. Gupta, “BDS: Browser Dependent XSS Sanitizer”, Book on Cloud-Based Databases with Biometric Applications, IGI-Global's Advances in Information Security, Privacy, and Ethics (AISPE) series, pp. 174-191, USA, 2014.
4. OWASP Top Ten Vulnerability Project 2013. Available at: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project.
5. D. Bates, A. Barth, and C. Jackson. Regular expressions considered harmful in client-side XSS filters. In Proceedings of the Conference on the World Wide Web, pages 91-100, 2010.