Showing 1 - 1 results of 1 for search '' Skip to content
Open Access
  • Home
  • Collections
    • High Impact Articles
    • Jawi Collection
    • Malay Medicine
    • Forensic
  • Search Options
    • UiTM Open Access
    • Search by UiTM Scopus
    • Advanced Search
    • Search by Category
  • Discovery Service
    • Sources
    • UiTM Journals
    • List UiTM Journal in IR
    • Statistic
  • About
    • Open Access
    • Creative Commons Licenses
    • COKI | Malaysia Open Access
    • User Guide
    • Contact Us
    • Search Tips
    • FAQs
Advanced
Reset Filters
Suggested Topics: Web application vulnerability
Reset Filters
Show filters (1)
Suggested Topics: Web application vulnerability
  • Search Results
Suggested Topics within your search. Suggested Topics within your search.
Algorithms 1 Buffer Overflow 1 Buffer overflows 1 Buffer storage 1 Cross site scripting 1 Cross-Site Request Forgery 1 Cross-Site Scripting 1 Information systems 1 Internet 1 Personal computing 1 SQL Injection 1 SQL injection 1 Scanning 1 Web Application Vulnerabilities 1 Web application vulnerability World Wide Web 1
Showing 1 - 1 results of 1 for search '', query time: 0.11s Refine Results
  1. 1
    A Method for Web Application Vulnerabilities Detection by Using Boyer-Moore String Matching Algorithm
    A Method for Web Application Vulnerabilities Detection by Using Boyer-Moore String Matching Algorithm
    by Ali, F.H.M, Bordea G., Buja, A.G, Jalil, K.A, Rahman, T.F.A, Rozali, N.A, Saleh, A.Z.M
    Published 2015
    Call Number: Loading...
    Located: Loading...
    View Fulltext in Publisher
    View in Scopus
    Article
Search Tools: Get RSS Feed — Email this Search

Narrow Search

Universiti Teknologi MARA 1
Article 1
Scopus 1
High Impact Journal 1
Ali, F.H.M 1 Bordea G. 1 Buja, A.G 1 Jalil, K.A 1 Rahman, T.F.A 1 Rozali, N.A 1 Saleh, A.Z.M 1 see all ...
English 1

© 2020 | Services hosted by the Perpustakaan Tun Abdul Razak, | Universiti Teknologi MARA | Disclaimer


Loading...