Open Access
E3S Web Conf.
Volume 224, 2020
Topical Problems of Agriculture, Civil and Environmental Engineering (TPACEE 2020)
Article Number 01040
Number of page(s) 9
Section Mathematical Models for Environmental Monitoring and Assessment
Published online 23 December 2020
  1. Types of XS: Stored XSS, Reflected XSS and DOM–Based XSS [Google Scholar]
  2. Laponina O R 2016 Cryptographic Foundations of Security (M.: National Open University INTUIT) p 242 [Google Scholar]
  3. Philips D A, Davis, M E 2019 Studying PHP and MySQL (K: “Symbol”) p 448 [Google Scholar]
  4. Elhadi A M Complete Guide to Intersite Scripting https://wwwsecuritylabru/analytics/432835php?R=1 [Google Scholar]
  5. Positive Research Vulnerabilities of Web–Applications: It’s Time to Analyze the Source Code http://wwwblogptsecurityru/2017/08/Web–attackshtml [Google Scholar]
  6. Esposito D 2017 Development of Modern Web–Applications Analysis of Subject Areas and Technologies (K: “Williams”) p 464 [Google Scholar]
  7. Gupta S and Gupta B 2017 International Journal of System Assurance Engineering and Management 8 512–530 [Google Scholar]
  8. Hydara I et all 2015 Information and Software Technology 58 170–186 [Google Scholar]
  9. Rohilla M, Kumar R and Gopal G 2016 International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) 6(6) 273–279 [Google Scholar]
  10. Tomohisa I and Sakurai K 2017 Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication ACM [Google Scholar]
  11. Parvez M, Zavarsky P and Khoury N 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST–2015) Doi: 10.1109/ICITST20157412085 [Google Scholar]
  12. Shahriar H and Zulkernine M 2011 Computer Software and Applications Conference Workshops (COMPSACW) IEEE 35th Annual 104–109 [Google Scholar]
  13. Shar L K, Beng H and Tan K 2011 Information and Software Technology 54 467–478 [Google Scholar]
  14. Parameshwaran I, Budianto E and Shinde Sh 2015 10th Joint Meeting on Foundations of Software Engineering 946–949 [Google Scholar]
  15. Gupta Sh and Gupta B 2016 ICETEST–2015 Proceedings Technology Elsevier 24 1595–1602 [Google Scholar]
  16. Yusof A S and Pathan K 2014 Proceedings 5th IEEE Conf Information and Communication Technology (ICT4M 14) 1–6 [Google Scholar]
  17. Shar L K and Tan H–B K 2012 Computer 45(3) 55–62 [Google Scholar]
  18. Kirda E et al 2006 Proc 21st Ann ACM Symposium Applied Computing (SAC06) 330– 337 [Google Scholar]
  19. Jim T Swamy N and Hicks M 2007 Proc 16th Int’l ACM Conf World Wide Web (WWW07) 601–610 [Google Scholar]
  20. Nadji Y, Saxena P, and Song D 2009 Proc 6th Ann Network & Distributed System Security Symposium (NDSS09) http://wwwcsberkeleyedu/~dawnsong/papers/2009%20dsi–ndss09pdf [Google Scholar]
  21. Louw M T and Venkatakrishnan V N 2009 Proc 30th IEEE Symposium Security and Privacy (S&P09) 331–346 [CrossRef] [Google Scholar]
  22. Thankachan A Ramakrishnan R and Kalaiarasi M 2014 Information Communication and Embedded Systems (ICICES), International Conf 1–9 [Google Scholar]
  23. Dukes L, Xiaohong Y, and Akowuah F 2013 Proceedings of IEEE 1–6 [Google Scholar]
  24. Shariar H and Zulkernine M 2011 IEEE 9th International Conference on Dependable Autonomic and Secure Computing 2011 7–14 [CrossRef] [Google Scholar]
  25. Patil D, Patil K 2015 International Journal of Computer Applications 121(20) 1–9 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.