YW Huang, F Yu, C Hang, CH Tsai, DT Lee… - Proceedings of the 13th …, 2004 - dl.acm.org
Security remains a major roadblock to universal acceptance of the Web for many kinds of transactions, especially since the recent sharp increase in remotely exploitable …
A Singh, JC Principe - 2009 International Joint Conference on …, 2009 - ieeexplore.ieee.org
Correntropy has been recently defined as a localised similarity measure between two random variables, exploiting higher order moments of the data. This paper presents the use …
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application …
Research has established the wide variety of security failures in mobile apps, their consequences, and how app developers introduce or exacerbate them. What is not well …
YW Huang, CH Tsai, TP Lin, SK Huang, DT Lee… - Computer Networks, 2005 - Elsevier
The rapid development phases and extremely short turnaround time of Web applications make it difficult to eliminate their vulnerabilities. Here we study how software testing …
Cross site scripting (XSS) is a vulnerability of a Web application that is essentially caused by the failure of the application to check up on user input before returning it to the client's Web …
The field of ubiquitous computing envisages an era when the average consumer owns hundreds or thousands of mobile and embedded computing devices. These devices will …
S Murugesan, A Ginige - Web engineering: principles and techniques, 2005 - igi-global.com
Web-based systems and applications now deliver a complex array of functionality to a large number of diverse groups of users. As our dependence and reliance on the Web has …