Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
CSRF
biblio
Secure Coding Practices in Java: Challenges and Vulnerabilities
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Security by Default
multiple security vulnerabilities
programming
programming challenges
programming obstacles
pubcrawl
resilience
Resiliency
Scalability
Secure Coding
secure coding assistance
secure coding practices
Libraries
Spring security
SSL-TLS security
SSL/TLS
StackOverflow
StackOverflow forum
StackOverflow posts
third-party framework
third-party libraries
XML
XML-based approaches
cryptographic hash functions
security
application program interfaces
authentication
authorisation
authorization
authorization features
Certificate Validation
complex Java-based
complicated cross-language data handling
Computer crime
cross-site request forgery attacks
coding theory
Cryptography
cryptography API
CSRF
developers time
empirical study
encoding
insecure coding practices
Java
Java platform
Java secure coding
biblio
An analysis of XSS, CSRF and SQL injection in colombian software and web site development
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Human behavior
XSS
websites
Web sites
web security
web applications
SQL injection
SQL
software engineering
software development
Software
security protocols
Resiliency
pubcrawl
internet
Colombian companies
hacking protection
Hacking
Economics
Databases
CSRF
Cross Site Scripting attacks
Cross Site Scripting
Cross Site Request Forgery
Computer crime
composability
Colombian Web Site development
Colombian software development
Colombian organizations
biblio
Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack
Submitted by BrandonB on Tue, 05/05/2015 - 10:52am
SQL injection
XSS
Web vulnerability detection model
Web pages
web applicationt
Web application vulnerabilities
Web application
vulneralbilities
Uniform resource locators
testing
system cracker
structured query language injection
SQL injection attack
authorisation
SQL
security
internet
hacking tutorials
hacking tools
Databases
CSRF
cross-site scripting
cross-site request forgery
Computer crime
Computational modeling