Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
24
views
44
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,227
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Risks and Security of Internet and Systems : 15th International Conference, CRiSIS 2020, Paris, France, November 4–6, 2020, Revised Selected Papers
An OWASP Top Ten Driven Survey on Web Application Protection Methods
other
Author(s):
Ouissem Ben Fredj
,
Omar Cheikhrouhou
,
Moez Krichen
,
Habib Hamam
,
Abdelouahid Derhab
Publication date
(Online):
February 12 2021
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
NeuroImaging Methods
Most cited references
44
Record
: found
Abstract
: not found
Book Chapter
: not found
Design and synthesis of synchronization skeletons using branching time temporal logic
Edmund M. Clarke
,
E. Allen Emerson
(1982)
0
comments
Cited
45
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
W. Joosen
,
G. Vigna
,
F. Piessens
…
(2013)
0
comments
Cited
33
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Specification and verification of concurrent systems in CESAR
J. Queille
,
J. Sifakis
(1982)
0
comments
Cited
32
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2021
Publication date (Online):
February 12 2021
Pages
: 235-252
DOI:
10.1007/978-3-030-68887-5_14
SO-VID:
06743307-781e-4367-a84c-7d7288c66ae4
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 235
An OWASP Top Ten Driven Survey on Web Application Protection Methods
pp. 317
Malicious Http Request Detection Using Code-Level Convolutional Neural Network
Similar content
1,227
OWASP Secure Coding Practices Quick Reference Guide
Authors:
OWASP top-10 2013
Authors:
Wichers Dave
OWASP
Authors:
See all similar
Cited by
1
Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems
Authors:
Darpan Anand
,
Vineeta Khemchandani
,
Munish Sabharawal
…
See all cited by