共 16 条
[1]
Chuvakin A, 2010, CISC VIS NETW IND GL
[2]
Gupta S., 2012, Logging and monitoring to detect network intrusions and compliance violations in the environment
[3]
Hassan M., QUANTITATIVE ASSESSM
[4]
Hassan Md Maruf, 2018, INT J SIMUL SYST SCI, V19, P6
[5]
Jan S., 2017, IEEE T SOFTWARE ENG
[6]
Known XML Vulnerabilities Are Still a Threat to Popular Parsers and Open Source Systems
[J].
2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (QRS 2015),
2015,
:233-241
[7]
Kaur D., 2014, INT J SCI ENG RES, V3, P2347
[8]
Li XL, 2018, SPRINGERBRIEF MATH, P1, DOI 10.1007/978-3-319-89617-5_1
[9]
A Defensive Approach for CSRF and Broken Authentication and Session Management Attack
[J].
AMBIENT COMMUNICATIONS AND COMPUTER SYSTEMS, RACCCS 2017,
2018, 696
:577-588
[10]
Nunes E, 2018, PROCEEDINGS OF THE 2018 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), P58