[1]
|
Ge, X., Paige, R.F., Polack, F.A., Chivers, H. and Brooke, P.J. (2006) Agile Development of Secure Web Applications. Proceedings of the 6th International Conference on Web Engineering. Palo Alto, 11-14 July 2006, 305-312.
|
[2]
|
Norwawi, N.M. and Selamat, M.H. (2011) Secure E-Commerce Web Development Framework. Infor-mation Technology Journal, 10, 769-778.
|
[3]
|
McGraw, G. and Viega, J. (2002) Building Secure Software. In RTO/NATO Real-Time Intrusion Detection Symp.
|
[4]
|
Mouratidis, H., Jürjens, J. and Fox, J. (2006) Towards a Comprehensive Framework for Secure Systems Development. Advanced Information Systems Engineering. Springer, Berlin Heidelberg, 48-62.http://dx.doi.org/10.1007/11767138_5
|
[5]
|
Keele, S. (2007) Guidelines for Performing Systematic Literature Reviews in Software Engineering. Technical Report, EBSE Technical Report EBSE-2007-01, 1-57.
|
[6]
|
Cachia, E. and Micallef, M. (2007) A Multi-Tier, Multi-Role Security Framework for E-Commerce Systems. 14th Annual IEEE International Conference and Workshops on the Engineering of Compu-ter-Based Systems, Tucson, 26-29 March 2007, 422-432.
|
[7]
|
Lipner, S. (2004) The Trustworthy Computing Security Development Lifecycle. 20th Annual Computer Security Applications Conference, Washington, 6-10 December 2004, 2-13. http://dx.doi.org/10.1109/csac.2004.41
|
[8]
|
Sulayman, M. and Mendes, E. (2009) A Systematic Literature Review of Software Process Improvement in Small and Medium Web Companies. Advances in Software Engineering. Springer, Berlin Heidelberg, 1-8. http://dx.doi.org/10.1007/978-3-642-10619-4_1
|
[9]
|
Shar, L.K. and Tan, H.B.K. (2012) Automated Removal of Cross Site Scripting Vulnerabilities in Web Applications. Information and Software Technology, 54, 467-478. http://dx.doi.org/10.1016/j.infsof.2011.12.006
|
[10]
|
Avancini, A. and Ceccato, M. (2013) Comparison and Integration of Genetic Algorithms and Dynamic Symbolic Execution for Security Testing of Cross-Site Scripting Vulnerabilities. Information and Software Technology, 55, 2209-2222. http://dx.doi.org/10.1016/j.infsof.2013.08.001
|
[11]
|
Jang, Y.S. and Choi, J.Y. (2014) Detecting SQL Injection Attacks Using Query Result Size. Computers & Security, 44, 104-118. http://dx.doi.org/10.1016/j.cose.2014.04.007
|
[12]
|
Goseva-Popstojanova, K., Anastasovski, G., Dimitrijevikj, A., Pantev, R. and Miller, B. (2014) Characterization and Classification of Malicious Web Traffic. Computers & Security, 42, 92-115. http://dx.doi.org/10.1016/j.cose.2014.01.006
|
[13]
|
Shahriar, H., Weldemariam, K., Zulkernine, M. and Lutellier, T. (2014) Effective Detection of Vulnerable and Malicious Browser Extensions. Computers & Security, 47, 66-84. http://dx.doi.org/10.1016/j.cose.2014.06.005
|
[14]
|
Scholte, T., Balzarotti, D. and Kirda, E. (2012) Have Things Changed Now? An Empirical Study on Input Validation Vulnerabilities in Web Applications. Computers & Security, 31, 344-356. http://dx.doi.org/10.1016/j.cose.2011.12.013
|
[15]
|
Woo, S.W., Joh, H., Alhazmi, O.H. and Malaiya, Y.K. (2011) Modeling Vulnerability Discovery Process in Apache and IIS HTTP Servers. Computers & Security, 30, 50-62. http://dx.doi.org/10.1016/j.cose.2010.10.007
|
[16]
|
Awoleye, O.M., Ojuloge, B. and Ilori, M.O. (2014) Web Application Vulnerability Assessment and Policy Direction towards a Secure Smart Government. Government Information Quarterly, 31, S118-S125. http://dx.doi.org/10.1016/j.giq.2014.01.012
|
[17]
|
Buja, G., Bin Abd Jalil, K., Bt Hj Mohd Ali, F. and Rahman, T.F.A. (2014) Detection Model for SQL Injection Attack: An Approach for Preventing a Web Application from the SQL Injection Attack. Proceedings of the 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), Penang, 7-8 April 2014, 60-64.
|
[18]
|
Salas, M.I.P. and Martins, E. (2014) Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security. Electronic Notes in Theoretical Computer Science, 302, 133-154. http://dx.doi.org/10.1016/j.entcs.2014.01.024
|
[19]
|
Shar, L.K. and Tan, H.B.K. (2013) Predicting SQL Injection and Cross Site Scripting Vulnerabilities through Mining Input Sanitization Patterns. Information and Software Technology, 55, 1767-1780. http://dx.doi.org/10.1016/j.infsof.2013.04.002
|
[20]
|
Katkar Anjali, S. and Kulkarni Raj, B. (2012) Web Vulnerability Detection and Security Mechanism. International Journal of Soft Computing and Engineering (IJSCE), 2, 237-241.
|
[21]
|
Wang, S., Gong, Y., Chen, G., Sun, Q. and Yang, F. (2013) Service Vulnerability Scanning Based on Service-Oriented Architecture in Web Service Environments. Journal of Systems Architecture, 59, 731-739.http://dx.doi.org/10.1016/j.sysarc.2013.01.002
|