Data in Transit Validation for Cloud Computing Using Cloud-Based Algorithm Detection of Injected Objects
暂无分享,去创建一个
[1] Mohammad Zulkernine,et al. Information-Theoretic Detection of SQL Injection Attacks , 2012, 2012 IEEE 14th International Symposium on High-Assurance Systems Engineering.
[2] Michael D. Ernst,et al. Automatic creation of SQL Injection and cross-site scripting attacks , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[3] Dwen-Ren Tsai,et al. Optimum tuning of defense settings for common attacks on the web applications , 2009, 43rd Annual 2009 International Carnahan Conference on Security Technology.
[4] Lwin Khin Shar,et al. Defending against Cross-Site Scripting Attacks , 2012, Computer.
[5] Dimitris Gritzalis,et al. Securing cloud and mobility: A practitioner's guide , 2014, Comput. Secur..
[6] M. Ponnavaikko,et al. A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).
[7] Hossain Shahriar,et al. Design and development of Anti-XSS proxy , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).
[8] Shih-Jen Chen,et al. TransSQL: A Translation and Validation-Based Solution for SQL-injection Attacks , 2011, 2011 First International Conference on Robot, Vision and Signal Processing.
[9] T. Matsuda,et al. On the automatic detection algorithm of Cross Site Scripting (XSS) with the non-stationary Bernoulli distribution , 2012, The 5th International Conference on Communications, Computers and Applications (MIC-CCA2012).