References of "IEEE Computer"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailDefeating SQL Injection
Shar, Lwin Khin UL; Tan, Hee Beng Kuan

in IEEE Computer (2013), 46(3), 69-77

The best strategy for combating SQL injection, which has emerged as the most widespread website security risk, calls for integrating defensive coding practices with both vulnerability detection and ... [more ▼]

The best strategy for combating SQL injection, which has emerged as the most widespread website security risk, calls for integrating defensive coding practices with both vulnerability detection and runtime attack prevention methods. [less ▲]

Detailed reference viewed: 125 (3 UL)
Full Text
Peer Reviewed
See detailDefending against Cross-Site Scripting Attacks
Shar, Lwin Khin UL; Tan, Hee Beng Kuan

in IEEE Computer (2012), 45(3), 55-62

Researchers have proposed multiple solutions to cross-site scripting, but vulnerabilities continue to exist in many Web applications due to developers’ lack of understanding of the problem and their ... [more ▼]

Researchers have proposed multiple solutions to cross-site scripting, but vulnerabilities continue to exist in many Web applications due to developers’ lack of understanding of the problem and their unfamiliar- ity with current defenses’ strengths and limitations. [less ▲]

Detailed reference viewed: 121 (2 UL)