Cited By
View all- Yee G(2017)Selecting a cloud service provider to minimize privacy risks2017 Annual Reliability and Maintainability Symposium (RAMS)10.1109/RAM.2017.7889714(1-7)Online publication date: 23-Jan-2017
SQL Injection vulnerability is ranked 1st in the OWASP1 top 10 vulnerability list and has resulted in massive attacks on a number of websites in the past few years. Inspite of preventive measures like educating developers about safe coding practices, ...
Software vulnerability is the fault that can be viciously used to harm security of software system. In order to decrease the harm, vulnerability analysis can be used to find security problems of software system as early as possible, and related measures,...
A large set of diverse hybrid mobile apps, which use both native Android app UIs and Web UIs, are widely available in today's smartphones. These hybrid apps usually use SSL or TLS to secure HTTP based communication. However, researchers show that ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in