共 26 条
[1]
Alazab A., INT J COMPUT APPL, V154, P1
[2]
Alnabulsi H., 2018, ADV INTELL SYST COMP, P281, DOI [10.1007/978-3-319-67071-3_35, DOI 10.1007/978-3-319-67071-3_35]
[3]
Alnabulsi Hussein., 2014, Computer Science and Engineering (APWC on CSE), 2014 Asia-Pacific World Congress on, P1
[4]
[Anonymous], XSS FILT EV CHEAT SH
[5]
Binbin Qu, 2013, 2013 IEEE 4th International Conference on Software Engineering and Service Science (ICSESS), P89, DOI 10.1109/ICSESS.2013.6615262
[6]
Choudhary Atul S., 2012, International Journal of Computer Applications, V52, DOI DOI 10.5120/8174-1493
[7]
Vulnerability & Attack Injection for Web Applications
[J].
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009),
2009,
:93-+
[8]
Gimenez C. T., HTTP DATASET CSIC 20
[10]
IBM Security, IBM SEC NETW INTR PR