메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Behind an application firewall, are we safe from SQL injection attacks?

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; NETWORK SECURITY; ONLINE SYSTEMS; SOFTWARE TESTING; VERIFICATION;

EID: 84935108505     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICST.2015.7102581     Document Type: Conference Paper
Times cited : (48)

References (20)
  • 16
    • 37049007001 scopus 로고    scopus 로고
    • Testing input validation in web applications through automated model recovery
    • H. Liu and H. B. Kuan Tan. Testing input validation in web applications through automated model recovery. Journal of Systems and Software, 81(2):222-233, 2008.
    • (2008) Journal of Systems and Software , vol.81 , Issue.2 , pp. 222-233
    • Liu, H.1    Kuan Tan, H.B.2
  • 17
    • 3142725712 scopus 로고    scopus 로고
    • Search-based software test data generation: A survey
    • P. McMinn. Search-based software test data generation: a survey. Software Testing, Verification and Reliability, 14(2):105-156, 2004.
    • (2004) Software Testing, Verification and Reliability , vol.14 , Issue.2 , pp. 105-156
    • McMinn, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.