2011 Fourth IEEE International Conference on Software Testing, Verification and Validation 2011
DOI: 10.1109/icst.2011.56
|View full text |Cite
|
Sign up to set email alerts
|

Tailored Shielding and Bypass Testing of Web Applications

Abstract: User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 7 publications
(9 reference statements)
0
1
0
Order By: Relevance
“…Authors have extensively reviewed the publications from the selected online databases and hardly found model evaluations that used more than two case studies. For example, three test cases with one tester were used by Goseva-Popstojanova & Perhinschi [121], Al-Azzani et al [122], and Mouelhi et al [123]. Therefore, to keep the evaluation framework and its results clear and readable, improve the reliability and generalization of the model evaluation framework, and reduce the criticisms of the single case study, we suggest using two case studies.…”
Section: Generalizationmentioning
confidence: 99%
“…Authors have extensively reviewed the publications from the selected online databases and hardly found model evaluations that used more than two case studies. For example, three test cases with one tester were used by Goseva-Popstojanova & Perhinschi [121], Al-Azzani et al [122], and Mouelhi et al [123]. Therefore, to keep the evaluation framework and its results clear and readable, improve the reliability and generalization of the model evaluation framework, and reduce the criticisms of the single case study, we suggest using two case studies.…”
Section: Generalizationmentioning
confidence: 99%