2019
DOI: 10.1007/978-3-030-15235-2_66
|View full text |Cite
|
Sign up to set email alerts
|

Research and Implementation of Security Vulnerability Detection in Application System of WEB Static Source Code Analysis Based on JAVA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 10 publications
0
0
0
Order By: Relevance
“…But the random token detection mechanism should be revised due to errors in random token detection. Yuan et al [14] investigate vulnerabilities and analyze the common vulnerabilities in web applications. Anbiya et al [15] in the paper will present an approach using static analysis with lexical analysis techniques for reducing an expert's knowledge.…”
Section: Related Workmentioning
confidence: 99%
“…But the random token detection mechanism should be revised due to errors in random token detection. Yuan et al [14] investigate vulnerabilities and analyze the common vulnerabilities in web applications. Anbiya et al [15] in the paper will present an approach using static analysis with lexical analysis techniques for reducing an expert's knowledge.…”
Section: Related Workmentioning
confidence: 99%
“…That can improve the recognition rate of the detection system. Yuan et al [33] investigate vulnerabilities analyze common web application vulnerabilities, research the basic characteristics of these vulnerabilities in depth, and comprehend the principles and remedies to these weaknesses. Moustafa et al [34] suggest a method to automatically extract relevant features from web data and network traffic data to improve the effectiveness of threat detection techniques.…”
Section: Related Workmentioning
confidence: 99%