-
1
-
-
84979755003
-
OWASP Top 10-2013
-
OWASP
-
OWASP, "OWASP Top 10-2013," OWASP Top 10, p. 22, 2013
-
(2013)
OWASP Top 10
, pp. 22
-
-
-
2
-
-
84952319241
-
-
[Accessed: 15-Nov-2015]
-
OWASP, "Web Application Firewall," 2015. [Online]. Available: https://www.owasp.org/index.php/Web-Application -Firewall. [Accessed: 15-Nov-2015]
-
(2015)
Web Application Firewall
-
-
-
3
-
-
84979730632
-
Microsoft azure machine learning studio
-
Microsoft Azure[Accessed: 25-Jan-2015]
-
Microsoft Azure, "Microsoft Azure Machine Learning Studio," Microsoft Azure Machine Learning. [Online]. Available: https://studio.azureml.net/. [Accessed: 25-Jan-2015]
-
Microsoft Azure Machine Learning
-
-
-
4
-
-
84979762001
-
SQL injection cookbook-oracle-OWASP
-
[Accessed: 01-Jan-2015]
-
Oracle, "SQL Injection Cookbook-Oracle-OWASP," OWASP, 2007. [Online]. Available: ttps://www.owasp.org/index.php/SQL -Injection-Cookbook---Oracle. [Accessed: 01-Jan-2015]
-
(2007)
OWASP
-
-
-
5
-
-
84979738634
-
-
[Accessed: 19-Feb-2016]
-
Microsoft Azure, "Two-Class Averaged Perceptron," MSDN. [Online]. Available: https://msdn.microsoft.com/en-us/library/az ure/dn906036.aspx. [Accessed: 19-Feb-2016]
-
Two-Class Averaged Perceptron
-
-
-
6
-
-
84979755007
-
Two-class logistic regression
-
[Accessed: 01-Feb-2016]
-
Microsoft Azure, "Two-Class Logistic Regression," MSDN Library,2015.[Online].Available:https://msdn.microsoft.com/enus/ library/azure/dn905994.aspx. [Accessed: 01-Feb-2016]
-
(2015)
MSDN Library
-
-
-
7
-
-
84979762029
-
AMNESIA: Analysis and monitoring for neutralizing SQLinjection attacks
-
W. G. J. Halfond, A. Orso, D. A. Kindy, and A. S. K. Pathan, "AMNESIA: Analysis and Monitoring for NEutralizing SQLinjection Attacks," Int. J. Commun. Networks Inf. Secur., vol. 5, pp. 80-92, 2013
-
(2013)
Int. J. Commun. Networks Inf. Secur
, vol.5
, pp. 80-92
-
-
Halfond, W.G.J.1
Orso, A.2
Kindy, D.A.3
Pathan, A.S.K.4
-
8
-
-
50249160574
-
KDD cup 1999 dataset
-
S. J. Stolfo, "KDD cup 1999 dataset," UCI KDD Repos. http//kdd.ics.uci.edu, p. 0, 1999
-
(1999)
UCI KDD Repos
-
-
Stolfo, S.J.1
-
9
-
-
84959283014
-
-
L. K. Shar, L. C. Briand, H. K. Tan, and S. Member, "Hybrid Program Analysis and Machine Learning," vol. 12, no. 6, pp. 688-707, 2015
-
(2015)
Hybrid Program Analysis and Machine Learning
, vol.12
, Issue.6
, pp. 688-707
-
-
Shar, L.K.1
Briand, L.C.2
Tan, H.K.3
Member, S.4
-
11
-
-
72949084588
-
SQLProb a proxy-based architecture towards preventing SQL injection attacks
-
A. Liu, Y. Yuan, D. Wijesekera, and A. Stavrou, "SQLProb: A Proxy-based Architecture towards Preventing SQL Injection Attacks," System, pp. 2054-2061, 2009
-
(2009)
System
, pp. 2054-2061
-
-
Liu, A.1
Yuan, Y.2
Wijesekera, D.3
Stavrou, A.4
-
12
-
-
4544287108
-
JDBC checker: A static analysis tool for SQL/JDBC applications
-
C. Gould, Z. Su, and P. Devanbu, "JDBC checker a static analysis tool for SQL/JDBC applications," in Software Engineering, 2004. ICSE 2004. Proceedings. 26th International Conference on, 2004, pp. 697-698
-
(2004)
Software Engineering, 2004. ICSE 2004. Proceedings. 26th International Conference on
, pp. 697-698
-
-
Gould, C.1
Su, Z.2
Devanbu, P.3
-
14
-
-
84979759629
-
-
Aspx. [Accessed: 07-Jun-2015]
-
MSDN, "Matching Behavior." [Online]. Available: https://msdn.microsoft.com/en-us/library/0yzc2yb0(v=vs.100). Aspx. [Accessed: 07-Jun-2015]
-
Matching Behavior
-
-
|