메뉴 건너뛰기




Volumn , Issue , 2008, Pages 63-67

A study of AJAX vulnerability in web 2.0 applications

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATIONS;

EID: 57949098442     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICADIWT.2008.4664319     Document Type: Conference Paper
Times cited : (9)

References (15)
  • 1
    • 36248965112 scopus 로고    scopus 로고
    • Web 2.0 Creates Security Challenges
    • Oct
    • George Lawton, "Web 2.0 Creates Security Challenges", IEEE Computer, Oct. 2007. p. 17-20.
    • (2007) IEEE Computer , pp. 17-20
    • Lawton, G.1
  • 2
    • 57949085753 scopus 로고    scopus 로고
    • Blogging and the Wisdom of Crowds, In: http://www.oreillynet.com/pub/a/ oreilly/tim/news/2005/09/30/what-is-web-20.html?page=3.
    • Blogging and the Wisdom of Crowds, In: http://www.oreillynet.com/pub/a/ oreilly/tim/news/2005/09/30/what-is-web-20.html?page=3.
  • 4
    • 51849113693 scopus 로고    scopus 로고
    • Hsinchun Chen, Sven Thoms, T. J. Fu, Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Groups, IEEE International Conference on Intelligence and Security Informatics, 2008.
    • Hsinchun Chen, Sven Thoms, T. J. Fu, "Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Group"s, IEEE International Conference on Intelligence and Security Informatics, 2008.
  • 5
    • 51849146839 scopus 로고    scopus 로고
    • R. Jones, "Jihadinets," http://counterterrorismblog.org/2007/ 12/jihadinets.php
    • Jihadinets
    • Jones, R.1
  • 6
    • 57949097658 scopus 로고    scopus 로고
    • Second Life, Virtual Worlds + Botnets = Terrorist Training, http://www.boxxet.com/Second_Life/Virtual_Worlds_Botnets_Terrorist_Training. 1f6ycp.d
    • Second Life, "Virtual Worlds + Botnets = Terrorist Training," http://www.boxxet.com/Second_Life/Virtual_Worlds_Botnets_Terrorist_Training. 1f6ycp.d
  • 7
    • 57949090405 scopus 로고    scopus 로고
    • Websense Security Labs. Research highlights Q3-Q4, 2007.
    • Websense Security Labs. Research highlights Q3-Q4, 2007.
  • 8
    • 57949096945 scopus 로고    scopus 로고
    • http://www.fortify.com/advisory.jsp
  • 10
    • 57949090786 scopus 로고    scopus 로고
    • Web Application Firewalls: Application Protection and Much More
    • Gerald Arcuri.," Web Application Firewalls: Application Protection and Much More", Business Market Strategies, Volume 1, Number 13
    • Business Market Strategies , vol.1 , Issue.13
    • Arcuri, G.1
  • 12
    • 36248965112 scopus 로고    scopus 로고
    • Web 2.0 Creates Security Challenges, Lawton, G. IEEE Computer, 40, Issue 10, Oct. 2007. 13-16.
    • Web 2.0 Creates Security Challenges, Lawton, G. IEEE Computer, Vol. 40, Issue 10, Oct. 2007. 13-16.
  • 13
    • 51849113693 scopus 로고    scopus 로고
    • Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Groups Hsinchun Chen, Sven Thoms, T. J. Fu, In: IEEE International Conference on Intelligence and Security Informatics, 2008.
    • Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Groups Hsinchun Chen, Sven Thoms, T. J. Fu, In: IEEE International Conference on Intelligence and Security Informatics, 2008.
  • 15
    • 37249087196 scopus 로고    scopus 로고
    • Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks
    • November/December
    • Markus Jakobsson, Sid Stamm, Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks, IEEE Security & Privacy, November/December 2007. Vol. 5, No. 6. pp. 16-24.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.6 , pp. 16-24
    • Jakobsson, M.1    Stamm, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.