共 25 条
- [1] Avancini A., 2010, P 2010 ICSE WORKSHOP, P65, DOI [10.1145/1809100.1809110, DOI 10.1145/1809100.1809110]
- [2] Damodaran A., 2015, J COMPUTER VIROLOGY, P1, DOI [10.1007/s11416-015-0261-z, DOI 10.1007/S11416-015-0261-Z]
- [3] Dong GW, 2014, INT JOINT CONF COMP, P319, DOI 10.1109/JCSSE.2014.6841888
- [4] Duchene F., 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST 2012), P815, DOI 10.1109/ICST.2012.181
- [5] A Practical Experience on the Impact of Plugins in Web Security [J]. 2014 IEEE 33RD INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2014, : 21 - 30
- [6] Govil, 2014, RECENT ADV INNOVATIO, P9, DOI [10.1109/ICRAIE.2014.6909173, DOI 10.1109/ICRAIE.2014.6909173]
- [7] XSS Vulnerability Detection Using Optimized Attack Vector Repertory [J]. 2015 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, 2015, : 29 - 36
- [8] Gupta B, 2015, CROSS SITE SCRIPTING
- [9] Gupta MK, 2015, INT JOINT CONF COMP, P162, DOI 10.1109/JCSSE.2015.7219789
- [10] Gupta P, 2011, COMM COM INF SC, V198, P122