Asian Journal of Information Technology
Year:
2017
Volume:
16
Issue:
6
Page No.
544 - 551
References
Bai, K., H. Wang and P. Liu, 2005. Towards database firewalls. Proceedings of the 19th Annual Working Conference on Data and Applications Security and Privacy, August 7-10, 2005, Springer, Berlin, Germany, pp: 178-192.
Bates, D., A. Barth and C. Jackson, 2010. Regular expressions considered harmful in client-side XSS filters. Proceedings of the 19th International Conference on World Wide Web, April 26-30, 2010, ACM, Raleigh, North Carolina, ISBN:978-1-60558-799-8, pp: 91-100.
Boneh, D. and M.K. Franklin, 2001. Identity-based Encryption from the Weil Pairing. In: Advances in Cryptology, Kilian, J. (Ed.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-42456-7, pp: 213-229.
Boneh, D., X. Boyen and H. Shacham, 2004. Short Group Signatures. In: Advances in Cryptology-CRYPToZ004, Franklin, M.K. (Ed.). LNCS 3152. Springer, Berlin, pp: 41-55.
Christodorescu, M. and S. Jha, 2006. Static analysis of executables to detect malicious patterns. MSc Thesis, Dept of Computer Sciences, University of Wisconsin-Madison, Madison, Wisconsin.
Debar, H., M. Dacier and A. Wespi, 1999. Towards a taxonomy of intrusion-detection systems. Comput. Networks, 31: 805-822.
CrossRef | Direct Link | Dolev, D. and A.C. Yao, 1983. On the security of public key protocols. IEEE Trans. Inform. Theor., 29: 198-208.
Frohlich, B. and J. Plate, 2000. The cubic mouse: A new device for three-dimensional input. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 01-06, 2000, ACM, Hague, Netherlands, ISBN:1-58113-216-6, pp: 526-531.
NVD., 2017. Subscribe to updates from NVD, SCAP, XCCDF and emerging specifications: Announcement and discussion lists. Northern Vision Development, Whitehorse, Canada. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4333.
Nabeel, M., N. Shang and E. Bertino, 2013. Privacy preserving policy-based content sharing in public clouds. IEEE. Trans. Knowl. Data Eng., 25: 2602-2614.
CrossRef | Direct Link | Sekar, R., 2009. An efficient black-box technique for defeating web application attacks. Master Thesis, Stony Brook University, Stony Brook, New York.
Stavrou, A., C.G.F. Cretu, M.E. Locasto and S.J. Stolfo, 2009. Keep your friends close: The necessity for updating an anomaly sensor with legitimate environment changes. Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, November 09-09, 2009, ACM, Chicago, Illinois, USA., ISBN:978-1-60558-781-3, pp: 39-46.
Tupakula, U.K. and V. Varadharajan, 2003. A practical method to counteract denial of service attacks. Proceedings of the 26th International Conference on Australasian Computer Science Vol. 16, February, 14, 2003, Australian Computer Society, Adelaide, Australia, ISBN:0-909-92594-1, pp: 275-284.
Wagner, D. and D. Dean, 2001. Intrusion detection via static analysis. Proceedings of the IEEE Symposium on Security and Privacy, May 14-16, Oakland, CA., USA., pp: 156-168.
Yu, Y.T. and M.F. Lau, 2006. A comparison of MC-DC, MUMCUT and several other coverage criteria for logical decisions. J. Syst. Software, 79: 577-590.
Direct Link |