[1]Jovanovic N, Kruegel C, Kirda E. Pixy: A static analysis tool for detecting Web application vulnerabilities[C] Proc of 2006 IEEE Symp on Security and Privacy (S&P’06). Piscataway, NJ: IEEE, 2006[2]Wassermann G, Su Z. Static detection of crosssite scripting vulnerabilities[C] Proc of the 30th Int Conf on Software Engineering (ICSE’08). New York: ACM, 2008: 171180[3]付昌兰, 张贺, 李凤龙, 等. 一种基于威胁模型的安全测试用例生成框架和工具[JOL]. 软件学报, 2023 [20240513]. https:jos.org.cnjosarticleabstract6793[4]胡志伟. Web应用安全漏洞扫描系统的设计与实现[D]. 北京: 北京邮电大学, 2013[5]廖微. 智能微电网中具有可扩展性的Web漏洞扫描工具研究与实现[J]. 信息安全研究, 2022, 8(12): 11981208[6]Howard G M, Gutierrez C N, Arshad F A, et al. pSigene: Webcrawling to generalize SQL injection signatures[C] Proc of the 44th Annual IEEEIFIP Int Conf on Dependable Systems and Networks. Piscataway, NJ: IEEE, 2014: 4556[7]Zou D, Wang S, Xu S, et al, VulDeePecker: A deep learningbased system for multiclass vulnerability detection[J]. IEEE Trans on Dependable and Secure Computing, 2021 18(5): 22242236[8]Rathore S, Sharma P K, Park J H. XSSClassifier: An efficient XSS attack detection approachbased on machine learning classifier on SNSs[J]. Journal of Information Processing Systems, 2017, 13(4): 10141028[9]王丹, 赵文兵, 丁治明. Web应用常见注入式安全漏洞检测关键技术综述[J]. 北京工业大学学报, 2016, 42(12): 18221832[10]Kyaw A K, Sioquim F, Joseph J. Dictionary attack on Wordpress: Security and forensic analysis[C] Proc of the 2nd Int Conf on Information Security and Cyber Forensics (InfoSec). Piscataway, NJ: IEEE, 2015: 158164[11]周中华, 张惠然, 谢江. 基于Python的新浪微博数据爬虫[J]. 计算机应用, 2014, 34(11): 31313134[12]Aggarwal V, Kaur D, Mittal S, et al. A comparative study of directory fuzzing tools[C] Proc of 2023 Int Conf on Circuit Power and Computing Technologies (ICCPCT). 2023: 13681374
|