Cited By
View all- Chen YLi YPan ZLu YChen JJi S(2024)URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic TestingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.333588519(1251-1266)Online publication date: 2024
- Amin Azad BNikiforakis NShehab MFernandez MLi N(2023)Role Models: Role-based Debloating for Web ApplicationsProceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy10.1145/3577923.3583647(251-262)Online publication date: 24-Apr-2023
- Islam SMohanKumar MJannat U(2023)Exploring the Effectiveness of Web Application Firewalls Against Diverse Attack Vectors2023 7th International Conference on Electronics, Communication and Aerospace Technology (ICECA)10.1109/ICECA58529.2023.10395379(1798-1806)Online publication date: 22-Nov-2023
- Show More Cited By