A deliberately insecure RDF-based Semantic Web application framework for teaching SPARQL/SPARUL injection attacks and defense mechanisms
暂无分享,去创建一个
[1] Hilary Cheng,et al. An ontology-based business intelligence application in a financial knowledge management system , 2009, Expert Syst. Appl..
[2] Jim Sermersheim,et al. Lightweight Directory Access Protocol (LDAP): The Protocol , 2006, RFC.
[3] Georg Lausen,et al. SP^2Bench: A SPARQL Performance Benchmark , 2008, 2009 IEEE 25th International Conference on Data Engineering.
[4] Bhavani M. Thuraisingham,et al. Security standards for the semantic web , 2005, Comput. Stand. Interfaces.
[5] Brian McBride,et al. Jena: A Semantic Web Toolkit , 2002, IEEE Internet Comput..
[6] Chengqi Zhang,et al. Building an Ontology for Financial Investment , 2000, IDEAL.
[7] Albert L. Harris,et al. The impact of information richness on information security awareness training effectiveness , 2009, Comput. Educ..
[8] Ivan Marsá-Maestre,et al. Design and evaluation of a learning environment to effectively provide network security skills , 2013, Comput. Educ..
[9] Martin Hepp,et al. GoodRelations: An Ontology for Describing Products and Services Offers on the Web , 2008, EKAW.
[10] Giovanni Vigna,et al. Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners , 2010, DIMVA.
[11] Shuai Zhang,et al. Exploring injection prevention technologies for security-aware distributed collaborative manufacturing on the Semantic Web , 2011 .
[12] Alessandro Orso,et al. A Classification of SQL Injection Attacks and Countermeasures , 2006, ISSSE.
[13] Andy Seaborne,et al. SPARQL/Update: A language for updating RDF graphs , 2007 .
[14] Patrícia Augustin Jaques,et al. A Semantic Web-based authoring tool to facilitate the planning of collaborative learning scenarios compliant with learning theories , 2013, Comput. Educ..
[15] Frank van Harmelen,et al. Sesame: A Generic Architecture for Storing and Querying RDF and RDF Schema , 2002, SEMWEB.
[16] S. T. Sarasamma,et al. Hierarchical Kohonenen net for anomaly detection in network security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[17] David LeBlanc,et al. Writing Secure Code , 2001 .