Proceedings of the Twelfth International Conference on World Wide Web - WWW '03 2003
DOI: 10.1145/775173.775174
|View full text |Cite
|
Sign up to set email alerts
|

Web application security assessment by fault injection and behavior monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
39
0
1

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 40 publications
(40 citation statements)
references
References 0 publications
0
39
0
1
Order By: Relevance
“…However, this order generally defines the semantics of the page. Thus, it is important to take it into account to assess the similarity, as performed in [5] with a text similarity distance. As an example, the two following pages use the same words in a different order, but they have different semantics:…”
Section: Discussion and Contributionsmentioning
confidence: 99%
See 3 more Smart Citations
“…However, this order generally defines the semantics of the page. Thus, it is important to take it into account to assess the similarity, as performed in [5] with a text similarity distance. As an example, the two following pages use the same words in a different order, but they have different semantics:…”
Section: Discussion and Contributionsmentioning
confidence: 99%
“…Besides SQL injections, the proposed approach can address XPATH, OS Commanding, and File include vulnerabilities. While our work shares some of the ideas and objectives presented in [5], we follow different approaches. For example, the clustering approach which is the core of our algorithm is not used in [5].…”
Section: Discussion and Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Some Artificial intelligence techniques have been proposed as solution to the SQL injection attack. Between the approaches revised is WAVES (Web Application Vulnerability and Error Scaner) [27]. This solution is based on a black-box technique.…”
Section: Database Threat and Security Revisionmentioning
confidence: 99%