咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 1 篇 学位论文
  • 1 篇 会议

馆藏范围

  • 6 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 5 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 2 篇 软件工程
    • 1 篇 信息与通信工程

主题

  • 6 篇 input validation...
  • 3 篇 software securit...
  • 2 篇 data mining
  • 2 篇 automatic protec...
  • 2 篇 web applications
  • 2 篇 security
  • 2 篇 source code stat...
  • 2 篇 false positives
  • 1 篇 features extract...
  • 1 篇 systematics
  • 1 篇 source code revi...
  • 1 篇 minimal ssa
  • 1 篇 source code anal...
  • 1 篇 static analysis
  • 1 篇 circular depende...
  • 1 篇 databases
  • 1 篇 web security
  • 1 篇 xss
  • 1 篇 codes
  • 1 篇 machine learning

机构

  • 1 篇 univ lisbon fac ...
  • 1 篇 univ lisbon inst...
  • 1 篇 univ lisbon fac ...
  • 1 篇 universidade de ...
  • 1 篇 univ sains malay...
  • 1 篇 univ lisbon inst...
  • 1 篇 univ lisbon inst...
  • 1 篇 izmir inst techn...
  • 1 篇 arab open univ f...
  • 1 篇 inesc id p-1699 ...
  • 1 篇 univ khartoum fa...

作者

  • 2 篇 medeiros iberia
  • 2 篇 correia miguel
  • 1 篇 faisal fadlalla ...
  • 1 篇 zaaba zarul fitr...
  • 1 篇 miguel amorim fa...
  • 1 篇 neves nuno
  • 1 篇 elshoush huwaida...
  • 1 篇 neves nuno f.
  • 1 篇 suwais khaled
  • 1 篇 ufuktepe ekincan
  • 1 篇 tuglular tugkan
  • 1 篇 marashdih abdall...

语言

  • 6 篇 英文
检索条件"主题词=Input validation vulnerabilities"
6 条 记 录,以下是1-10 订阅
排序:
input validation vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-Art
收藏 引用
IEEE ACCESS 2023年 11卷 40128-40161页
作者: Faisal Fadlalla, Faris Elshoush, Huwaida T. Univ Khartoum Fac Math Sci & Informat Dept Comp Sci Khartoum 11115 Sudan
In recent years, huge increase in attacks and data breaches is noticed. Most of the attacks are performed and focused on the vulnerabilities related to web applications. Hence, nowadays the mitigation of application v... 详细信息
来源: 评论
Estimating software robustness in relation to input validation vulnerabilities using Bayesian networks
收藏 引用
SOFTWARE QUALITY JOURNAL 2018年 第2期26卷 455-489页
作者: Ufuktepe, Ekincan Tuglular, Tugkan Izmir Inst Technol Dept Comp Engn Izmir Turkey
Estimating the robustness of software in the presence of invalid inputs has long been a challenging task owing to the fact that developers usually fail to take the necessary action to validate inputs during the design... 详细信息
来源: 评论
Predicting input validation vulnerabilities based on minimal SSA features and machine learning
收藏 引用
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES 2022年 第10期34卷 9311-9331页
作者: Marashdih, Abdalla Wasef Zaaba, Zarul Fitri Suwais, Khaled Univ Sains Malaysia Sch Comp Sci George Town 11800 Malaysia Arab Open Univ Fac Comp Studies Riyadh Saudi Arabia
Structured Query Language injection (SQLi) and Cross-Site Scripting (XSS) are the most renowned kinds of input validation vulnerabilities. Of late, vulnerability prediction models based on machine learning have been g... 详细信息
来源: 评论
Detecting and Removing Web Application vulnerabilities with Static Analysis and Data Mining
收藏 引用
IEEE TRANSACTIONS ON RELIABILITY 2016年 第1期65卷 54-69页
作者: Medeiros, Iberia Neves, Nuno Correia, Miguel Univ Lisbon Fac Ciencias LaSIGE P-1699 Lisbon Portugal Univ Lisbon Inst Super Tecn INESC ID P-1699 Lisbon Portugal Univ Lisbon Inst Super Tecn P-1699 Lisbon Portugal INESC ID P-1699 Lisbon Portugal
6Although a large research effort on web application security has been going on for more than a decade, the security of web applications continues to be a challenging problem. An important part of that problem derives... 详细信息
来源: 评论
Automatic Detection and Correction of Web Application vulnerabilities using Data Mining to Predict False Positives  14
Automatic Detection and Correction of Web Application Vulner...
收藏 引用
23rd International Conference on World Wide Web (WWW)
作者: Medeiros, Iberia Neves, Nuno F. Correia, Miguel Univ Lisbon Fac Sci LaSIGE Lisbon Portugal Univ Lisbon Inst Super Tecn INESC ID Lisbon Portugal
Web application security is an important problem in today's internet. A major cause of this status is that many programmers do not have adequate knowledge about secure coding, so they leave applications with vulne... 详细信息
来源: 评论
IMPROVING VULNERABILITY DETECTION OF WAP
IMPROVING VULNERABILITY DETECTION OF WAP
收藏 引用
作者: Miguel Amorim Fale Universidade de Lisboa
学位级别:硕士
For over two decades, the web has been evolving from a simple set of hypermedia documents to a complex ecosystem of web applications that are supported by various frameworks. This paradigm shift has been promoting a s... 详细信息
来源: 评论