共 40 条
[1]
[Anonymous], 2015, 2015 IEEE 8 INT C SO
[2]
[Anonymous], 2018, 2018 4 INT C OPT APP
[3]
[Anonymous], 2017, INT J ADV RES COMPUT
[5]
Security Testing of Web Applications: a Search Based Approach for Cross-Site Scripting Vulnerabilities
[J].
11TH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION (SCAM 2011),
2011,
:85-94
[6]
Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing
[J].
2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (QRS 2015),
2015,
:207-212
[7]
Chandrasekar K., 2017, SYMANTEC, V22, P77
[8]
Chen D, 2017, AAAI C ART INT
[9]
Choi S.-S. C., 2010, Journal of Systemics, Cybernetics and Informatics, V8, P43, DOI DOI 10.13053/CYS-20-3-2457
[10]
WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning
[J].
PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20),
2020,
:1745-1752