EAST: Exploitation of Attacks and System Threats in Network
暂无分享,去创建一个
[1] Oliver Popov,et al. Root cause analysis of session management and broken authentication vulnerabilities , 2012, World Congress on Internet Security (WorldCIS-2012).
[2] Pankaj Sharma,et al. Integrated approach to prevent SQL injection attack and reflected cross site scripting attack , 2012, Int. J. Syst. Assur. Eng. Manag..
[3] Rahul Johari,et al. CAVEAT: Credit Card Vulnerability Exhibition and Authentication Tool , 2014, SSCC.
[4] Marco Vieira,et al. Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection , 2014, IEEE Transactions on Dependable and Secure Computing.
[5] Mazdak Zamani,et al. A Taxonomy of SQL Injection Detection and Prevention Techniques , 2013, 2013 International Conference on Informatics and Creative Multimedia.
[6] Rahul Johari,et al. A New Framework for Credit Card Transactions Involving Mutual Authentication between Cardholder and Merchant , 2011, 2011 International Conference on Communication Systems and Network Technologies.
[7] William K. Robertson,et al. Preventing Input Validation Vulnerabilities in Web Applications through Automated Type Analysis , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.
[8] Rahul Johari,et al. Secure Query Processing in Delay Tolerant Network Using Java Cryptography Architecture , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.
[9] Rahul Johari,et al. Sane : Secure Encryption Technique for Alphnumeric Data Over Web Based Applications , 2014 .
[10] R. Johari,et al. A Survey on Web Application Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL Injection , 2012, 2012 International Conference on Communication Systems and Network Technologies.