Search Results

There are 68091 results for: content related to: Static detection of logic vulnerabilities in Java web applications

  1. Taming transitive permission attack via bytecode rewriting on Android application

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2100–2114, Daibin Wang, Hai Jin, Deqing Zou, Peng Xu, Tianqing Zhu and Gang Chen

    Version of Record online : 22 FEB 2016, DOI: 10.1002/sec.1466

  2. Service delivery models of cloud computing: security issues and open challenges

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4726–4750, Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab and Suleman Khan

    Version of Record online : 30 AUG 2016, DOI: 10.1002/sec.1585

  3. XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 3966–3986, Shashank Gupta and Brij Bhooshan Gupta

    Version of Record online : 15 AUG 2016, DOI: 10.1002/sec.1579

  4. A survey of lightweight stream ciphers for embedded systems

    Security and Communication Networks

    Volume 9, Issue 10, 10 July 2016, Pages: 1226–1246, Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis and Yannis Papaefstathiou

    Version of Record online : 21 DEC 2015, DOI: 10.1002/sec.1399

  5. CAPTCHA and its Alternatives: A Review

    Security and Communication Networks

    Volume 8, Issue 12, August 2015, Pages: 2135–2156, Mohammad Moradi and MohammadReza Keyvanpour

    Version of Record online : 30 OCT 2014, DOI: 10.1002/sec.1157

  6. A model-driven approach for experimental evaluation of intrusion detection systems

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1955–1973, Anas Abou El Kalam, Mohamed Gad El Rab and Yves Deswarte

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.911

  7. PaddyFrog: systematically detecting confused deputy vulnerability in Android applications

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2338–2349, Jianliang Wu, Tingting Cui, Tao Ban, Shanqing Guo and Lizhen Cui

    Version of Record online : 30 JAN 2015, DOI: 10.1002/sec.1179

  8. Combining expert knowledge with automatic feature extraction for reliable web attack detection

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2750–2767, Carmen Torrano-Gimenez, Hai Thanh Nguyen, Gonzalo Alvarez and Katrin Franke

    Version of Record online : 29 AUG 2012, DOI: 10.1002/sec.603

  9. Data integration using service composition in data service middleware

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2134–2144, Sofien Gannouni, Mutaz Beraka and Hassan Mathkour

    Version of Record online : 10 DEC 2013, DOI: 10.1002/sec.925

  10. Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5563–5580, Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das and Vanga Odelu

    Version of Record online : 20 JAN 2017, DOI: 10.1002/sec.1717

  11. A systematic study of content security policy in web applications

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3570–3584, Shukai Liu, Xuexiong Yan, Qingxian Wang and Qi Xi

    Version of Record online : 7 JUL 2016, DOI: 10.1002/sec.1562

  12. GlobalView: building global view with log files in a distributed/networked system for accountability

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2564–2586, Yang Xiao, Songqing Yue, Bo Fu and Suat Ozdemir

    Version of Record online : 21 SEP 2011, DOI: 10.1002/sec.374

  13. A collaborative approach on host and network level android malware detection

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5639–5650, Chanwoo Bae and Seungwon Shin

    Version of Record online : 22 FEB 2017, DOI: 10.1002/sec.1723

  14. JS-SAN: defense mechanism for HTML5-based web applications against javascript code injection vulnerabilities

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1477–1495, Shashank Gupta and B. B. Gupta

    Version of Record online : 19 FEB 2016, DOI: 10.1002/sec.1433

  15. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  16. Accountability using flow-net: design, implementation, and performance evaluation

    Security and Communication Networks

    Volume 5, Issue 1, January 2012, Pages: 29–49, Yang Xiao, Ke Meng and Daisuke Takahashi

    Version of Record online : 16 JUN 2011, DOI: 10.1002/sec.348

  17. Using HTML5 to prevent detection of drive-by-download web malware

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1237–1255, Alfredo De Santis, Giancarlo De Maio and Umberto Ferraro Petrillo

    Version of Record online : 21 AUG 2014, DOI: 10.1002/sec.1077

  18. Software-defined networking (SDN): a survey

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5803–5833, Kamal Benzekki, Abdeslam El Fergougui and Abdelbaki Elbelrhiti Elalaoui

    Version of Record online : 7 FEB 2017, DOI: 10.1002/sec.1737

  19. Mathematical modeling of the propagation of malware: a review

    Security and Communication Networks

    Volume 8, Issue 15, October 2015, Pages: 2561–2579, Angel Martín del Rey

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1186

  20. Trust coercion in the name of usable public key infrastructure

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1734–1745, Dimitrios Zissis and Dimitrios Lekkas

    Version of Record online : 31 AUG 2013, DOI: 10.1002/sec.870