1 |
A. Ron, A. Shulman-Peleg, and E. Bronshtein, "No SQL, no injection?," Proceedings of the 36th IEEE Symposium on Web 2.0 Security and Privacy, May. 2015.
|
2 |
B. Hou, K. Qian, L. Li, Y. Shi, L. Tao, and J. Liu, "MongoDB NoSQL Injection Analysis and Detection," Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, pp. 75-78, Aug. 2016.
|
3 |
A. M. Eassa, O. H. Al-Tarawneh, and A. S. Salama, "Nosql racket: A testing tool for detecting nosql injection attacks in web applications," International Journal of Advanced Computer Science and Applications, 8(11), pp.614-622, Nov. 2017.
|
4 |
Wired Business Media, "Thousands of MongoDB Databases Found Exposed on the Internet," https://www.securityweek.com/thousands-Mongodb-databases-found-exposed-internet, 20200228
|
5 |
M. R. Ul Islam, M. S. Islam, Z. Ahmed, A. Iqbal, and R. Shahriyar, "Automatic Detection of NoSQL Injection Using Supervised Learning," Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, pp. 760-769, July. 2019.
|
6 |
Y. Bengio, A. Courville, and P. Vincent, "Representation Learning: A Review and New Perspectives," IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(8), pp.1798-1828, Aug. 2013.
DOI
|
7 |
S. Albelwi and A. Mahmood, "A frame work for designing the architectures of deep convolutional neural networks," Entropy, 19(6), pp. 242-263, May. 2017.
DOI
|
8 |
F. A. Gers, J. Schmidhuber, and F. Cummins, "Learning to forget: continua l prediction with LSTM," Proceedings of the 9th International Conference on Artificial Neural Networks, pp. 850-855, Sep. 1999.
|
9 |
B. Shi, X. Bai, and C. Yao, "An endto-end trainable neural network for image-based sequence recognition and its application to scene text recognition," IEEE transactions on pattern analysis and machine intelligence, 39(11), pp. 2298-2304, Dec. 2016
DOI
|
10 |
X. Zhang, J. Zhao, and Y. LeCun, "Character-level convolutional networks for text classification," Advances in Neural Information Processing Systems 28, pp. 649-657, 2015.
|
11 |
B. Xu, N. Wang, T. Chen, and M. Li, "Empirical evaluation of rectified activations in convolutional network," arXiv preprint arXiv:1505.00853, 2015
|
12 |
D. P. Kingma and J. Ba, "Adam: A method for stochastic optimization," arXiv preprint arXiv:1412.6980, 2014.
|
13 |
NIST, "CVE-2018-1784 Detail," https://nvd.nist.gov/vuln/detail/CVE-2018-1784#vulnCurrentDescriptionTitle, 20200228
|
14 |
MongoDB, "mongodb all customers," https://www.Mongodb.com/who-uses-Mongodb, 20200302
|
15 |
CWE, "CWE VIEW: Weaknesses in the 2019 CWE Top 25 Most Dangerous Software Errors," https://cwe.mitre.org/data/definitions/1200.html, 20200302
|
16 |
OWASP, "OWASP Top10," https://owasp.org/www-project-top-ten/, 20200228
|
17 |
NIST, "CVE-2019-9039 Detail," https://nvd.nist.gov/vuln/detail/CVE-2019-9039, 20200228
|