1. Development of Vulnerable Web Application Based on OWASP API Security Risks
2. Docker Remote API Unauthorized Access Vulnerability Exploitation Tool [J];Jian;Computer System Application,2017
3. Overview of Cloud Application Programming Interface Security Research: Threats and Protection [J];Zhen;Journal of Electronics and Information Technology,2023
4. Web Command Injection Vulnerability Detection for Cisco IOS-XE [J];Jie;Computer Science,2023