共 10 条
[1]
[Anonymous], 2015, P 9 INT C IT AS CITA
[2]
[Anonymous], 2014, 5 INT C INFORM COMMU
[3]
[Anonymous], 1 INT S DIG FOR SEC
[4]
[Anonymous], 2015, INT C PERVASIVE COMP, DOI DOI 10.1109/PERVASIVE.2015.7087131
[5]
Bherde GP, 2016, 2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), P1174, DOI 10.1109/ICACDOT.2016.7877771
[6]
Bozic J, 2013, 2013 8TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST), P71, DOI 10.1109/IWAST.2013.6595794
[7]
Maurya S, 2015, ANNU IEEE IND CONF
[8]
Sahin M, 2017, 2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), P1150, DOI 10.1109/UBMK.2017.8093398
[9]
Shrivastava A, 2016, PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), P850, DOI 10.1109/NGCT.2016.7877529
[10]
Detection and Prevention of Code Injection Attacks on HTML']HTML5-based Apps
[J].
2015 THIRD INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA,
2015,
:254-261