Reviewing risks and vulnerabilities in web 2.0 for matching security considerations in web 3.0
暂无分享,去创建一个
Nazar Abbas Saqib | Sujata Dash | Asiya Abdus Salam | Atta-ur-Rahman | Atta-Ur-Rahman | S. Dash | N. Saqib | A. Salam
[1] Veronica Popovici,et al. Web 2.0 Tools in the Context of Integrated Communication: New Technologies Revolutionizing the Business Environment , 2009, 2009 International Conference on Management and Service Science.
[2] Xi Chen,et al. A Literature Review of Privacy Research on Social Network Sites , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[3] Eddie Rabinovitch. Protect your users against the latest web-based threat: malicious code on caching servers [Your Internet Connection] , 2007, IEEE Communications Magazine.
[4] Atta Rahman. Optimum information embedding in digital watermarking , 2019, J. Intell. Fuzzy Syst..
[5] Marco Vieira,et al. Using web security scanners to detect vulnerabilities in web services , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[6] Riaan J. Rudman,et al. Incremental risks in Web 2.0 applications , 2010, Electron. Libr..
[7] Maqsood Mahmud,et al. Medical Image Watermarking for Fragility and Robustness: A Chaos, Error Correcting Codes and Redundant Residue Number System Based Approach , 2018 .
[8] Kiran Kumar.,et al. SybilDefense : Defending Sybil attacks using techniques from Complex Systems , 2010 .
[9] Stephen Baden,et al. Mashup ( web application hybrid ) , 2011 .
[10] Robert A. Martin,et al. Vulnerability Type Distributions in CVE , 2007 .
[11] S. Mohorovicic. Implementing responsive web design for enhanced web presence , 2013, 2013 36th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[12] Mahesh Chandra Govil,et al. Predicting Cross-Site Scripting (XSS) security vulnerabilities in web applications , 2015, 2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE).
[13] Isabella Peters,et al. Folksonomies - Indexing and Retrieval in Web 2.0 , 2009, Knowledge and Information.
[14] Atta ur Rahman,et al. The Digital Library and the Archiving System for Educational Institutes , 2018, Pakistan Journal of Information Management and Libraries.
[15] Meledath Damodaran,et al. Security in web 2.0 application development , 2008, iiWAS.
[16] Wei Sun,et al. Towards Service Composition Based on Mashup , 2007, 2007 IEEE Congress on Services (Services 2007).
[17] Bebo White. The Implications of Web 2.0 on Web Information Systems , 2006, WEBIST.
[18] Maqsood Mahmud,et al. Evolutionary-based image encryption using RNA codons truth table , 2020 .
[19] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[20] George Lawton. Web 2.0 Creates Security Challenges , 2007, Computer.
[21] Naveen Chilamkurti,et al. A Neuro-fuzzy approach for user behaviour classification and prediction , 2019, Journal of Cloud Computing.
[22] Ashish Kr. Luhach,et al. Investigating TYPE constraint for frequent pattern mining , 2019, Journal of Discrete Mathematical Sciences and Cryptography.
[23] Rachid Zagrouba,et al. Enhanced query processing over semantic cache for cloud based relational databases , 2020, Journal of Ambient Intelligence and Humanized Computing.