-
2
-
-
49949109144
-
CANDID: Preventing sql injection attacks using dynamic candidate evaluations
-
Bandhakavi, S., Bisht, P., Madhusudan, P., & Venkatakrishnan, V. (2007). CANDID: Preventing sql injection attacks using dynamic candidate evaluations. ACM Conference on Computer and Communications Security (pp. 12-24).
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 12-24
-
-
Bandhakavi, S.1
Bisht, P.2
Madhusudan, P.3
Venkatakrishnan, V.4
-
3
-
-
67651246228
-
Teaching and learning with the net generation
-
Barnes, K., Marateo, R. C., & Ferris, S. P. (2007). Teaching and learning with the net generation. Innovate Journal of Online Education, 3(4).
-
(2007)
Innovate Journal of Online Education
, vol.3
, Issue.4
-
-
Barnes, K.1
Marateo, R.C.2
Ferris, S.P.3
-
4
-
-
78549259165
-
-
17-19 August. Paper presented at the Privacy Security and Trust (PST).
-
Binsalleeh, H., Ormerod, T., Boukhtouta, A., Sinha, P., Youssef, A., Debbabi, M., & Wang, L. (2010, 17-19 August). On the analysis of the Zeus botnet crimeware toolkit. Paper presented at the Privacy Security and Trust (PST).
-
(2010)
On the analysis of the Zeus botnet crimeware toolkit
-
-
Binsalleeh, H.1
Ormerod, T.2
Boukhtouta, A.3
Sinha, P.4
Youssef, A.5
Debbabi, M.6
Wang, L.7
-
5
-
-
77949464016
-
CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks
-
Bisht, P., Madhusudan, P., & Venkatakrishnan, V. (2010). CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks. ACM Transactions on Information and System Security, 13(2), 1-39. doi:10.1145/1698750.1698754.
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.2
, pp. 1-39
-
-
Bisht, P.1
Madhusudan, P.2
Venkatakrishnan, V.3
-
6
-
-
77953855187
-
-
Paper presented at the Proceedings of the 5th international workshop on Software engineering and middleware. Lisbon, Portugal.
-
Buehrer, G., Weide, B. W., & Sivilotti, P. A. G. (2005). Using parse tree validation to prevent SQL injection attacks. Paper presented at the Proceedings of the 5th international workshop on Software engineering and middleware. Lisbon, Portugal.
-
(2005)
Using parse tree validation to prevent SQL injection attacks
-
-
Buehrer, G.1
Weide, B.W.2
Sivilotti, P.A.G.3
-
7
-
-
0013347631
-
Common vulnerabilities and exposures
-
Retrieved April, 2011
-
Corporation, M. (2010). Common vulnerabilities and exposures. Retrieved April, 2011, from http://cve.mitre.org/.
-
(2010)
-
-
Corporation, M.1
-
11
-
-
19944365247
-
-
Paper presented at the Proceedings of the 13th international conference on World Wide Web, New York, NY, USA.
-
Huang, Y.-W., Yu, F., Hang, C., Tsai, C.-H., Lee, D.-T., & Kuo, S.-Y. (2004). Securing web application code by static analysis and runtime protection. Paper presented at the Proceedings of the 13th international conference on World Wide Web, New York, NY, USA.
-
(2004)
Securing web application code by static analysis and runtime protection
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.-T.5
Kuo, S.-Y.6
-
13
-
-
77957570415
-
Research on Multi-Level Security Framework for OpenID
-
Jie, W., Phan, R. C. W., Whitley, J. N., & Parish, D. J. (2010). Research on Multi-Level Security Framework for OpenID. In Third International Symposium on Electronic Commerce and Security.
-
(2010)
In Third International Symposium on Electronic Commerce and Security.
-
-
Jie, W.1
Phan, R.C.W.2
Whitley, J.N.3
Parish, D.J.4
-
14
-
-
77955088380
-
A general definition of malware
-
Kramer, S., & Bradfield, J. C. (2010). A general definition of malware. Journal in Computer Virology, 6(2), 105-114. doi:10.1007/s11416-009-0137-1.
-
(2010)
Journal in Computer Virology
, vol.6
, Issue.2
, pp. 105-114
-
-
Kramer, S.1
Bradfield, J.C.2
-
15
-
-
33745203758
-
Finding application errors and security flaws using PQL: A program query language
-
Martin, M., Livshits, B., & Lam, M. S. (2005). Finding application errors and security flaws using PQL: A program query language. ACM SIGPLAN Notices, 40(10), 365-383. doi:10.1145/1103845.1094840.
-
(2005)
ACM SIGPLAN Notices
, vol.40
, Issue.10
, pp. 365-383
-
-
Martin, M.1
Livshits, B.2
Lam, M.S.3
-
17
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
Nguyen-Tuong, A., Guarnieri, S., Greene, D., Shirley, J., & Evans, D. (2005). Automatically hardening web applications using precise tainting. Security and Privacy in the Age of Ubiquitous Computing, 295-307.
-
(2005)
Security and Privacy in the Age of Ubiquitous Computing
, pp. 295-307
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
18
-
-
79960228516
-
The top 10 most critical web application security risks
-
Retrieved April 2011
-
OWASP. (2010). The top 10 most critical web application security risks. Retrieved April 2011, from owasp.org.
-
(2010)
-
-
-
19
-
-
0031648127
-
Accessing existing business data from the World Wide Web
-
Peng, C. S., Chen, S. K., Chung, J. Y., Roy-Chowdhury, A., & Srinivasan, V. (2010). Accessing existing business data from the World Wide Web. IBM Systems Journal, 37(1), 115-132. doi:10.1147/sj.371.0115.
-
(2010)
IBM Systems Journal
, vol.37
, Issue.1
, pp. 115-132
-
-
Peng, C.S.1
Chen, S.K.2
Chung, J.Y.3
Roy-Chowdhury, A.4
Srinivasan, V.5
-
20
-
-
33745661661
-
Defending against injection attacks through contextsensitive string evaluation
-
Valdes, A., & Zamboni, D. (Eds.). Springer
-
Pietraszek, T., & Berghe, C. (2006). Defending against injection attacks through contextsensitive string evaluation. In Valdes, A., & Zamboni, D. (Eds.), Recent advances in intrusion detection (Vol. 3858, pp. 124-145). Springer. doi:10.1007/11663812_7.
-
(2006)
Recent advances in intrusion detection
, vol.3858
, pp. 124-145
-
-
Pietraszek, T.1
Berghe, C.2
-
21
-
-
84898278186
-
The current state of cybercrime and what to expect in 2011
-
USA: EMC corporation.
-
RSA. (2011). The current state of cybercrime and what to expect in 2011. USA: EMC corporation.
-
(2011)
-
-
-
22
-
-
33745216482
-
-
Paper presented at the Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages. Charleston, South Carolina, USA.
-
Su, Z., & Wassermann, G. (2006). The essence of command injection attacks in web applications. Paper presented at the Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages. Charleston, South Carolina, USA.
-
(2006)
The essence of command injection attacks in web applications
-
-
Su, Z.1
Wassermann, G.2
-
23
-
-
78650825676
-
WASAT-A new web authorization security analysis tool
-
Torrano-Gimenez, C., Perez-Villegas, A., & Alvarez, G. (2010). WASAT-A new web authorization security analysis tool. Web Application Security, 39-49.
-
(2010)
Web Application Security
, pp. 39-49
-
-
Torrano-Gimenez, C.1
Perez-Villegas, A.2
Alvarez, G.3
-
24
-
-
84898224397
-
-
Retrieved February 3, 2011
-
Trend Micro. (2009). 2009's most persistent malware threats. Retrieved February 3, 2011, from http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/2009s_most_ persistent_malware_threats__march_2010_.pdf.
-
(2009)
2009's most persistent malware threats
-
-
-
25
-
-
84898333343
-
Banking malware Zeus sucessfully bypasses anti-virus detection
-
Retrieved March, 2011
-
Trusteer. (2009). Banking malware Zeus sucessfully bypasses anti-virus detection. Retrieved March, 2011, from http://www.ecommerce-journal.com/news/18221_zeus_increasingly_avoids_pcs_detection.
-
(2009)
-
-
-
26
-
-
26444575798
-
A learning-based approach to the detection of SQL attacks
-
Julisch, K., & Kruegel, C. (Eds.). Springer
-
Valeur, F., Mutz, D., & Vigna, G. (2005). A learning-based approach to the detection of SQL attacks. In Julisch, K., & Kruegel, C. (Eds.), Detection of intrusions and malware, and vulnerability assessment (Vol. 3548, pp. 533-546). Springer. doi:10.1007/11506881_8.
-
(2005)
Detection of intrusions and malware, and vulnerability assessment
, vol.3548
, pp. 533-546
-
-
Valeur, F.1
Mutz, D.2
Vigna, G.3
-
28
-
-
84868135977
-
Web applications: What are they? What about them? Retrieved 2011
-
Jun 11
-
Vella, K. J. (2007, Jun 11). Web applications: What are they? What about them? Retrieved 2011, from http://www.windowsecurity.com/articles/Web-Applications.html?printversion.
-
(2007)
-
-
Vella, K.J.1
-
29
-
-
84898258722
-
Introduction to SQL
-
Retrieved April, 2011
-
W3schools. (2011). Introduction to SQL. Retrieved April, 2011, from http://www.w3schools. com/sql/sql_intro.asp.
-
(2011)
-
-
-
32
-
-
84944623788
-
-
Paper presented at the 7th International Conference on Global Security, Safety & Sustainability. Thessaloniki, Greece.
-
Alazab, M., Ventatraman, S., Watters, P., Alazab, M., & Alazab, A. (2011). Cybercrime: The case of obuscated malware. Paper presented at the 7th International Conference on Global Security, Safety & Sustainability. Thessaloniki, Greece.
-
(2011)
Cybercrime: The case of obuscated malware
-
-
Alazab, M.1
Ventatraman, S.2
Watters, P.3
Alazab, M.4
Alazab, A.5
|