Citations
The paper
has been cited by the following works.
- H. Holm and M. Ekstedt.
A metamodel for web application injection attacks and countermeasures.
Lecture Notes in Business Information Processing, 131
LNBIP:198–217, 2012.
(doi:10.1007/978-3-642-34163-2_12)
- H. Holm, M. Ekstedt, and
T. Sommestad.
Effort estimates on web application vulnerability discovery.
In Proceedings of the Annual Hawaii International Conference on System
Sciences, pages 5029–5038, 2013.
- D. Holstein, T.W.
Cease, and M.G. Seewald.
Application and management of cybersecurity measures for protection and
control.
In 7th International Conference on Cyber-Enabled Distributed Computing
and Knowledge Discovery, CyberC 2015, pages 76–83. Institute of
Electrical and Electronics Engineers Inc., 2015.
(doi:10.1109/CyberC.2015.80)
- N. Palsetia,
G. Deepa, F. Ahmed Khan, P.S. Thilagam, and A.R. Pais.
Securing native XML database-driven web applications from XQuery injection
vulnerabilities.
Journal of Systems and Software, 122:93–109, 2016.
(doi:10.1016/j.jss.2016.08.094)
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.