共 19 条
[1]
[Anonymous], 2010, OWASP 2010 TOP 10
[2]
Artzi Shay., 2008, P 2008 INT S SOFTWAR, P261, DOI DOI 10.1145/1390630.1390662
[3]
Bisht P, 2008, LECT NOTES COMPUT SC, V5137, P23, DOI 10.1007/978-3-540-70542-0_2
[4]
Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks
[J].
13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS,
2007,
:365-+
[5]
Gundy M.V., 2009, NDSS
[6]
Ismail O, 2004, 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1 (LONG PAPERS), PROCEEDINGS, P145
[7]
Jim Trevor., 2007, WWW 07, P601, DOI DOI 10.1145/1242572.1242654
[8]
Automatic Creation of SQL Injection and Cross-Site Scripting Attacks
[J].
2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS,
2009,
:199-+
[9]
Kirda E., 2006, Applied Computing 2006. 21st Annual ACM Symposium on Applied Computing, P330, DOI 10.1145/1141277.1141357
[10]
Martin M.C., 2008, USENIX SECURITY S, P31