[1]
|
Deep learning trends and future perspectives of web security and vulnerabilities
Journal of High Speed Networks,
2024
DOI:10.3233/JHS-230037
|
|
|
[2]
|
Security Testing in The Wild: An Interview Study
2023 49th Euromicro Conference on Software Engineering and Advanced Applications (SEAA),
2023
DOI:10.1109/SEAA60479.2023.00037
|
|
|
[3]
|
Vulnerability diffusions in software product networks
Journal of Operations Management,
2023
DOI:10.1002/joom.1270
|
|
|
[4]
|
A multivocal literature review on record management potential components in CRUD operation for web application development
International Journal of Modeling, Simulation, and Scientific Computing,
2023
DOI:10.1142/S1793962323410192
|
|
|
[5]
|
Prediction of Software Security Vulnerabilities from Source Code Using Machine Learning Methods
2023 Innovations in Intelligent Systems and Applications Conference (ASYU),
2023
DOI:10.1109/ASYU58738.2023.10296747
|
|
|
[6]
|
Complexity Assessment of Research Space for Smart City Cybersecurity*
IFAC-PapersOnLine,
2022
DOI:10.1016/j.ifacol.2022.08.039
|
|
|
[7]
|
Analysis of Security Testing Techniques
Intelligent Automation & Soft Computing,
2021
DOI:10.32604/iasc.2021.017260
|
|
|
[8]
|
Vulnerabilities Mapping based on OWASP-SANS: A Survey for Static Application Security Testing (SAST)
Annals of Emerging Technologies in Computing,
2020
DOI:10.33166/AETiC.2020.03.001
|
|
|
[9]
|
Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems
Sustainable Cities and Society,
2020
DOI:10.1016/j.scs.2020.102416
|
|
|
[10]
|
Recurrent Neural Networks for Signature Generation
2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI),
2020
DOI:10.1109/CISP-BMEI51763.2020.9263638
|
|
|
[11]
|
MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique
IEEE Access,
2019
DOI:10.1109/ACCESS.2019.2927417
|
|
|
[12]
|
Handbook of Research on Network Forensics and Analysis Techniques
Advances in Information Security, Privacy, and Ethics,
2018
DOI:10.4018/978-1-5225-4100-4.ch004
|
|
|
[13]
|
Vulnerabilities and Security of Web Applications
2018 4th International Conference on Computing Communication and Automation (ICCCA),
2018
DOI:10.1109/CCAA.2018.8777558
|
|
|
[14]
|
Client Side Countermeasures for the Prevention of SQLIA in Web Applications
2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC),
2017
DOI:10.1109/ICCIC.2017.8524315
|
|
|