1 |
Steven Rosenbaum, Curation: A Breakthrough from the Age of Info-Glut, Myungjin Publishing Co., Seoul, 2011.
|
2 |
Jung-Sook Kim, "Video Curating Service System Using Mashup Customization Technique", Journal of Korea Multimedia Society, Vol. 17, No. 4, 2014.
|
3 |
http://www.wizmeta.com/
|
4 |
Fischman W, Solomon B, Greenspan D, Gardner H, Making good: how young people cope with moral dilemmas at work. Cambridge: Harvard University Press. 2004.
|
5 |
Open Web Application Security Project(OWASP), "OWASP Top 10 for 2013", 12 June, 2013.
|
6 |
The Open Web Application Security Project, "OWASP TOP 10 Project", http://www.owasp.org/
|
7 |
In-yong Lee, Jae-ik Cho, Kyu-hyung Cho, Jong0sub Moon, "SA Method for SQL Injection Attack Detection using the Removal of SQL Query Attribute Values", KIISC, 18(5), pp. 135-147, 2008.
|
8 |
Thomas. S, Williams. L, "Using Automated Fix Generation ot Secure SQL Statements", In Proceeding of the 29th international Conference on Software Engineering Workshops (ICSEW. IEEE Computer Society), pp. 54, 2007.
|
9 |
Kosuga. Y, Kernel. K, Hanaoka. M, Hishiyama. M, Takahama. Yu, "Sania : Syntactic and Semantic Analysis for Automated Testing against SQL Injection", In Proceedings of the Computer Security Applications Conference 2007, pp. 107-117, 2007.
|
10 |
Jae-Chul Park, Bong-Nam Noh, "QL Injection Attack Detection : Profiling of Web Application Parameter Using the Sequence Pairwise Alignment", Information Security Applications LNCS, Volume 4298, pp. 74-82, 2007.
|
11 |
Bozic, J.; Wotawa, F., "XSS pattern for attack modeling in testing", Automation of Software Test (AST), 2013 8th International Workshop on, Vol., No., pp.71-74, May, 2013.
|
12 |
Shahriar, H.; Zulkernine, M., "S2XS2: A Server Side Approach to Automatically Detect XSS Attacks," Dependable, Autonomic and Secure Computing(DASC), 2011 IEEE Ninth International Conference, Vol., No., pp.7-14, Dec. 2011.
|
13 |
Hui Zhao; Wen Chen, "A Web Page Malicious Script Detection Method Inspired by the Process of Immunoglobulin Secretion", Intelligence Information Processing and Trusted Computing (IPTC), 2010 International Symposium on , Vol., No., pp.241-245, Oct. 2010.
|
14 |
Yi Wang; Zhoujun Li; Tao Guo, "Program Slicing Stored XSS Bugs in Web Application," Theoretical Aspects of Software Engineering (TASE), 2011 Fifth International Symposium on, Vol., No., pp.191-194, Aug. 2011.
|
15 |
Sung-hyuck Hong, "XSS Attack and Countermeasure: Survey", The Journal of Digital Policy & Management, Vol. 11, No. 12, pp. 327-332, 2013.
|