Developing Security Assessment Models in Web2 Mobile Environments
暂无分享,去创建一个
Bong Gyou Lee | Taisiya Kim | Soo Kyung Park | Hyunsik Seo | Giseob Byun | Keon Chul Park | Taisiya Kim | S. Park | B. Lee | Giseob Byun | Hyunsik Seo | K. Park
[1] Seong-Ho Kim,et al. A Study of Web 2.0 Trend & Service View , 2007 .
[2] Paul Ritchie,et al. AJAX: The security risks of AJAX/web 2.0 applications , 2007 .
[3] Guo,et al. Smart-Phone Attacks and Defenses Chuanxiong , 2004 .
[4] Tim O'Reilly,et al. Web Squared: Web 2.0 Five Years On , 2009 .
[5] Mandy Salomon,et al. Would you consider using online virtual worlds for meetings , 2009 .
[6] H Geser,et al. Augmenting things, establishments and human beings. “Blended Reality” in a psycho-sociological perspective , 2010 .
[7] Zhou Xiao-yu. Study on Web 2.0 , 2010 .
[8] Ki-Young Lee,et al. A Study on the Web Service-Hacking Pattern Recognition System , 2009 .
[9] Dieter Schmalstieg,et al. First steps towards handheld augmented reality , 2003, Seventh IEEE International Symposium on Wearable Computers, 2003. Proceedings..
[10] Mark Graham,et al. Transparency and Development: Ethical Consumption through Web 2.0 and the Internet of Things , 2011 .