1 |
J. Srivastava, R. Cooley, M. Deshpande, P.-N. Tan, "Web usage mining: Discovery and applications of usage patterns from web data", ACM SIGKDD, 2000.
|
2 |
David Gourley and Brian Totty, "HTTP: The Definitive Guide", O'Reilly Media, 2002.
|
3 |
http://www.owasp.org/index.php/Cross-Site_Request_Forgery
|
4 |
OWASP, CSRF Guard, http://www.owasp.org/index.php/CSRF_Guard
|
5 |
N. Jovanovic, E. Kirda, and C. Kruegel, "Preventing Cross Site Request Forgery attacks", In IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), 2006.
|
6 |
A. Barth, C. Jackson, and J. C. Mitchell, "Robust defenses for Cross-Site Request Forgery", In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008), 2008.
|
7 |
Mike Shema, "Seven Deadliest Web Application Attacks", Syngress, 2010.
|
8 |
A. Klein. Forging, "HTTP request headers with Flash", http://www.securityfocus.com/archive/1/441014, 2006.
|
9 |
M. Johns and J. Winter, "RequestRodeo: Client side protection against session riding", In In Proceedings of the OWASP Europe 2006 Conference, 2006
|
10 |
W. Maes, T. Heyman, L. Desmet, and W. Joosen, "Browser Protection against Cross-Site Request Forgery", In Workshop on Secure Execution of Untrusted Code (SecuCode), 2009.
|
11 |
www.captcha.net
|
12 |
Bing Liu, "Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data", Springer, 2006.
|