共 126 条
[1]
Acker S.V., 2012, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS), P12, DOI [10.1145/2414456.2414462, DOI 10.1145/2414456.2414462]
[2]
A design of a proxy inspired from human immune system to detect SQL Injection and Cross-Site Scripting
[J].
INTERNATIONAL CONFERENCE ON ADVANCES SCIENCE AND CONTEMPORARY ENGINEERING 2012,
2012, 50
:19-28
[3]
Agosta G., 2012, Proceedings of the 2012 Ninth International Conference on Information Technology: New Generations (ITNG), P189, DOI 10.1109/ITNG.2012.167
[4]
Al-Amro H., 2012, 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), P329, DOI 10.1109/CyberSec.2012.6246175
[5]
[Anonymous], 16 ANN NETW DISTR SY
[6]
[Anonymous], 2012, P 7 ACM S INFORM COM, DOI DOI 10.1145/2414456.2414458
[7]
Arulsuju D, 2011, 2011 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), P13, DOI 10.1109/ICoAC.2011.6165172
[8]
Athanasopoulos E., 2010, W2SP 2010
[9]
Avancini A., 2012, 2012 Proceedings of 7th International Workshop on Automation of Software Test (AST 2012), P15, DOI 10.1109/IWAST.2012.6228984
[10]
Avancini A., 2010, Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems. Cape Town, South Africa, P65, DOI DOI 10.1145/1809100.1809110