1. Sentamilsevan, K, & Prasath, T. (2014). A Comprehensive Study of Cross-Site Request Forgery with Comprehensive Scrutiny. International Journal of Suitable Science and Engineering, 2(1).
2. Sentamilsevan K, Lakshmana S. P, & Ramkumar, N. (2014). Cross-Site Request Forgery: Preventive Measures. International Journal of Computer Applications, 106(11).
3. Burns, J. (2007). Cross-Site Request Forgery: An introduction to a common web application weakness. https://www.isecpartners.com Retrieved: 29/10/2019
4. Rupali D. K., & Meshram, B. B. (2012). CSRF Vulnerabilities and Defensive Techniques. International Journal of Computer Network and Information Security, 1, 31-37.
5. Sentamilsevan K, Lakshmana S. P, & Sathiyamurthy, K. (2013). Survey on Cross-Site Request Forgery (An overview of CSRF). IEEE – International Conference on Research and Development Prospects in Engineering and Technology, 5.