An Introduction to Remote Installation Vulnerability in Content Management Systems

[1]  Haya Shulman,et al.  DNSSEC for cyber forensics , 2014, EURASIP J. Inf. Secur..

[2]  Saudi Arabia,et al.  ASSESSMENT OF OPEN SOURCE WEB APPLICATION SECURITY SCANNERS , 2014 .

[3]  Young-Sik Jeong,et al.  Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol , 2015, Comput. Math. Appl..

[4]  Nor Badrul Anuar,et al.  An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..

[5]  Sang-Soo Yeo,et al.  Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..

[6]  Jin-Young Choi,et al.  Detecting SQL injection attacks using query result size , 2014, Comput. Secur..

[7]  Kanchana Natarajan,et al.  Generation of Sql-injection Free Secure Algorithm to Detect and Prevent Sql-Injection Attacks , 2012 .

[8]  Pierre Falzon,et al.  Quality in radiotherapy: effective treatment and patient safety. , 2012, Work.

[9]  G. Laccetti,et al.  Brute force attacks on hash functions , 2007 .

[10]  Z. Duric WAPTT - Web Application Penetration Testing Tool , 2014 .

[11]  M.I.P. Salas,et al.  Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security , 2014, CLEI Selected Papers.

[12]  S. K. Pandey,et al.  Software Security Rules, SDLC Perspective , 2009, ArXiv.

[13]  Bahram Honary,et al.  Security of the GPT cryptosystem and its applications to cryptography , 2011, Secur. Commun. Networks.

[14]  E. Sivasankar,et al.  Two level verification for detection of DNS rebinding attacks , 2013, Int. J. Syst. Assur. Eng. Manag..

[15]  Gerhard Steinke,et al.  Towards an Understanding of Web Application Security Threats and Incidents , 2011 .

[16]  Renaud Feil,et al.  Evolution of cross site request forgery attacks , 2008, Journal in Computer Virology.

[17]  Patrick G. Nyeste,et al.  Training Users to Counteract Phishing , 2010, Work.

[18]  Wen-Kui Chang,et al.  A Hot Query Bank approach to improve detection performance against SQL injection attacks , 2012, Comput. Secur..