相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks
Ahmad F. Subahi et al.
CMC-COMPUTERS MATERIALS & CONTINUA (2021)
A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics
Youseef Alotaibi
CMC-COMPUTERS MATERIALS & CONTINUA (2021)
Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security
Wael Said et al.
IEEE ACCESS (2020)
A Device Performance and Data Analytics Concept for Smartphones' IoT Services and Machine-Type Communication in Cellular Networks
Kingsley A. Ogudo et al.
SYMMETRY-BASEL (2019)
Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System
Bakare K. Ayeni et al.
JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS (2018)
SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel
Paul R. McWhirter et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)
Intent-Based Extensible Real-Time PHP Supervision Framework
Victor Prokhorenko et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints
Dimitris Mitropoulos et al.
ACM TRANSACTIONS ON PRIVACY AND SECURITY (2016)
Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning
Lwin Khin Shar et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)
Current state of research on cross-site scripting (XSS) - A systematic literature review
Isatou Hydara et al.
INFORMATION AND SOFTWARE TECHNOLOGY (2015)
A Survey on Detection and Prevention of Cross-Site Scripting Attack
V. Nithya et al.
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS (2015)
Detecting SQL injection attacks using query result size
Young-Su Jang et al.
COMPUTERS & SECURITY (2014)
Semantic security against web application attacks
Abdul Razzaq et al.
INFORMATION SCIENCES (2014)
CANDID: Dynamic Candidate Evaluations for Automatic Prevention of SQL Injection Attacks
Prithvi Bisht et al.
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2010)
WASP: Protecting web applications using positive tainting and syntax-aware evaluation
William G. J. Halfond et al.
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2008)