Suggested Topics within your search.
Suggested Topics within your search.
Buffer Overflow
2
Cross-Site Request Forgery
2
Cross-Site Scripting
2
SQL Injection
2
Web Application Vulnerabilities
2
Algorithms
1
Buffer overflows
1
Buffer storage
1
Cross site scripting
1
Information systems
1
Internet
1
Personal computing
1
SQL injection
1
SQL injection attack
1
Scanning
1
Web application vulnerability
1
World Wide Web
1
cyber-attack
1
database protection
1
hacking
1
web application vulnerabilities
1
-
1by Oluwakemi Christiana Abikoye, Abdullahi Abubakar, Ahmed Haruna Dokoro, Oluwatobi Noah Akande, Aderonke Anthonia KayodeSubjects: “...Web application vulnerability...”
Published 2020-08-01
Get full text
Article -
2by Anantaprayoon, AmataSubjects: “...Web application vulnerability...”
Published 2020
Get full text
Others -
3by Zhu, Yao ChuSubjects: “...web application vulnerabilities...”
Published 2016
Get fulltext
Others -
4
-
5
-
6by Ali, F.H.M, Bordea G., Buja, A.G, Jalil, K.A, Rahman, T.F.A, Rozali, N.A, Saleh, A.Z.MSubjects: “...Web Application Vulnerabilities...”
Published 2015
View Fulltext in Publisher
View in Scopus
Article