An Introduction to Remote Installation Vulnerability in Content Management Systems
暂无分享,去创建一个
[1] Haya Shulman,et al. DNSSEC for cyber forensics , 2014, EURASIP J. Inf. Secur..
[2] Saudi Arabia,et al. ASSESSMENT OF OPEN SOURCE WEB APPLICATION SECURITY SCANNERS , 2014 .
[3] Young-Sik Jeong,et al. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol , 2015, Comput. Math. Appl..
[4] Nor Badrul Anuar,et al. An appraisal and design of a multi-agent system based cooperative wireless intrusion detection computational intelligence technique , 2013, Eng. Appl. Artif. Intell..
[5] Sang-Soo Yeo,et al. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..
[6] Jin-Young Choi,et al. Detecting SQL injection attacks using query result size , 2014, Comput. Secur..
[7] Kanchana Natarajan,et al. Generation of Sql-injection Free Secure Algorithm to Detect and Prevent Sql-Injection Attacks , 2012 .
[8] Pierre Falzon,et al. Quality in radiotherapy: effective treatment and patient safety. , 2012, Work.
[9] G. Laccetti,et al. Brute force attacks on hash functions , 2007 .
[10] Z. Duric. WAPTT - Web Application Penetration Testing Tool , 2014 .
[11] M.I.P. Salas,et al. Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security , 2014, CLEI Selected Papers.
[12] S. K. Pandey,et al. Software Security Rules, SDLC Perspective , 2009, ArXiv.
[13] Bahram Honary,et al. Security of the GPT cryptosystem and its applications to cryptography , 2011, Secur. Commun. Networks.
[14] E. Sivasankar,et al. Two level verification for detection of DNS rebinding attacks , 2013, Int. J. Syst. Assur. Eng. Manag..
[15] Gerhard Steinke,et al. Towards an Understanding of Web Application Security Threats and Incidents , 2011 .
[16] Renaud Feil,et al. Evolution of cross site request forgery attacks , 2008, Journal in Computer Virology.
[17] Patrick G. Nyeste,et al. Training Users to Counteract Phishing , 2010, Work.
[18] Wen-Kui Chang,et al. A Hot Query Bank approach to improve detection performance against SQL injection attacks , 2012, Comput. Secur..