RECOGNITION AND RECTIFICATION OF WEB APPLICATION OBLIGATION WITH FIXED ANALYSIS AND TEXT MINING
Abstract
Keywords
References
Y.-W.Huangetal., “Webapplication securityassessmentbyfaultinjectionandbehaviormonitoring,”inProc.12thInt.Conf.WorldWide Web, 2003, pp. 148–159.
Y.-W. Huang et al., “Securing web application code by static analysisandruntimeprotection,”inProc.13thInt.Conf.WorldWideWeb, 2004, pp. 40–52.
J. C. Huang, Software Error Detection through Testing and Analysis. . New York, NY, USA: Wiley, 2009.
S. Son and V. Shmatikov, “SAFERPHP: Finding semantic vulnerabilities in PHP applications,” in Proc. ACM SIGPLAN 6th Workshop ProgrammingLanguagesandAnalysisforSecurity,2011.
G. T. Buehrer, B. W. Weide, and P. Sivilotti, “Using parse tree validation to prevent SQL injection attacks,” in Proc. 5th Int. Workshop Software Engineeringand Middleware,Sep.2005,pp.106–113.
L.K.SharandH.B.K.Tan, “Automated removal of crosssitescripting vulnerabilities in web applications,” Inf. Softw. Technol., vol. 54, no. 5, pp. 467–478, 2012.
Refbacks
- There are currently no refbacks.
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.