1. Developing web applications;Int. J. Softw. Eng. Appl.,2011
2. WebSHArk 1.0: A benchmark collection for malicious web shell detection;Kim;J. Inf. Process. Syst.,2015
3. Qian, L., Zhu, Z., Hu, J., and Liu, S. (2015, January 10–11). Research of SQL injection attack and prevention technology. Proceedings of the 2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF), Harbin, China.
4. Dahse, J., and Holz, T. (2014, January 20–22). Static Detection of {Second-Order} Vulnerabilities in Web Applications. Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, USA.
5. Zheng, Y., and Zhang, X. (2013, January 18–26). Path sensitive static analysis of web applications for remote code execution vulnerability detection. Proceedings of the 2013 35th International Conference on Software Engineering (ICSE), San Francisco, CA, USA.