[1]
|
A multivocal literature review on record management potential components in CRUD operation for web application development
International Journal of Modeling, Simulation, and Scientific Computing,
2023
DOI:10.1142/S1793962323410192
|
|
|
[2]
|
Complexity Assessment of Research Space for Smart City Cybersecurity*
IFAC-PapersOnLine,
2022
DOI:10.1016/j.ifacol.2022.08.039
|
|
|
[3]
|
Analysis of Security Testing Techniques
Intelligent Automation & Soft Computing,
2021
DOI:10.32604/iasc.2021.017260
|
|
|
[4]
|
Vulnerabilities Mapping based on OWASP-SANS: A Survey for Static Application Security Testing (SAST)
Annals of Emerging Technologies in Computing,
2020
DOI:10.33166/AETiC.2020.03.001
|
|
|
[5]
|
Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems
Sustainable Cities and Society,
2020
DOI:10.1016/j.scs.2020.102416
|
|
|
[6]
|
Recurrent Neural Networks for Signature Generation
2020 13th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI),
2020
DOI:10.1109/CISP-BMEI51763.2020.9263638
|
|
|
[7]
|
MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique
IEEE Access,
2019
DOI:10.1109/ACCESS.2019.2927417
|
|
|
[8]
|
Handbook of Research on Network Forensics and Analysis Techniques
Advances in Information Security, Privacy, and Ethics,
2018
DOI:10.4018/978-1-5225-4100-4.ch004
|
|
|
[9]
|
Vulnerabilities and Security of Web Applications
2018 4th International Conference on Computing Communication and Automation (ICCCA),
2018
DOI:10.1109/CCAA.2018.8777558
|
|
|
[10]
|
Client Side Countermeasures for the Prevention of SQLIA in Web Applications
2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC),
2017
DOI:10.1109/ICCIC.2017.8524315
|
|
|