共 63 条
[1]
Agrawal Alka, 2019, ICIC Express Letters, Part B: Applications, V10, P665, DOI 10.24507/icicelb.10.08.665
[2]
Agrawal A., 2020, IEEE ACCESS, V8, P135770
[5]
Agrawal A, 2022, J KING SAUD UNIV-COM, V34, P657, DOI 10.1016/j.jksuci.2019.04.007
[7]
Alenezi Mamdouh, 2019, ICIC Express Letters, V13, P453, DOI 10.24507/icicel.13.06.453
[8]
Alenezi M., 2020, INT J INTELLIGENT EN, V13, P181
[10]
Websites Input Validation and Input Misuse Based Attacks
[J].
2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC),
2016,
:113-116