1 |
Adam Kie˙zun, Philip J. Guo, Karthick Jayaraman, Michael D. Ernst, "Automatic Creation of SQL Injection and Cross-Site Scripting Attacks," ICSE‟09, May 16-24, 2009,
|
2 |
Gonzalez, J. M., Paxson, V., and Weaver N., "Shunting: a hardware/so ware architecture for exible, high-performance network intrusion prevention," In Conference on Computer and Communications Security (CCS), pp.129-149, 2007.
|
3 |
Fogla, P. and Lee, W., "Evading network anomaly detection systems: formal reasoning and practical techniques. In Proc of. ACM Conference on Computer and Communications Security (CCS), pp.59-68, 2006.
|
4 |
D. Scott and R. Sharp, "Avstracting Application-Level Web Security," Proc. 11th Int'l Conf. World Wide Web, pp.396-407, 2002.
|
5 |
Kruegel C., Mutz D., Valeur F., and Vigna G., "On the detection of anomalous system call arguments," In Proc. of European Symposium on Research in Computer Security, pp.326-343, 2003.
|
6 |
W. R. Cook and S. Rai, "Safe Query Objects: Statically Typed Objects as Remotely Executable Queries," Proc. 27th Int'l Conf. Software Eng. pp.97-106, 2005.
|
7 |
Klo M., Brefeld U., Dusse, P., Gehl C., and Laskov P., "Automatic feature selection for anomaly detection," In Proc. of ACM Workshop on Artical Intelligence for Security (AISEC), pp.71-76, 2008.
|