共 15 条
[1]
Alosefer Y., 2011, 2011 7th International Conference on Next Generation Web Services Practices, P31, DOI 10.1109/NWeSP.2011.6088149
[2]
Chan GY, 2015, 2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), P524, DOI 10.1109/FSKD.2015.7381997
[3]
Hammarberg D., 2014, BEST DEFENSES ZERO D
[4]
CRAXweb: Automatic Web Application Testing and Attack Generation
[J].
2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE),
2013,
:208-217
[5]
Kesharwani Swati Ramesh, 2012, INT J SCI RES IJSR, P2319
[6]
Kumar A, 2015, 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P1734, DOI 10.1109/ICACCI.2015.7275864
[7]
Mohantly M.S., 2008, Monetary Policy Transmission in Emerging Market Economies: What is New?, P1
[8]
Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks
[J].
2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS,
2015,
:172-183
[9]
Web Server Protection against Application Layer DDoS Attacks using Machine Learning and Traffic Authentication
[J].
IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3,
2015,
:261-267
[10]
Pandiaraja P., 2015, IEEE INT C CIRC POW