共 50 条
- [41] Transparent Tracing of Microservice-based Applications [J]. SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 1252 - 1259
- [42] Automatic Performance Simulation for Microservice Based Applications [J]. METHODS AND APPLICATIONS FOR MODELING AND SIMULATION OF COMPLEX SYSTEMS, 2018, 946 : 85 - 95
- [43] Detecting Unknown Inconsistencies in Web Applications [J]. PROCEEDINGS OF THE 2017 32ND IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE'17), 2017, : 566 - 577
- [44] Detecting anomaly and failure in Web applications [J]. IEEE MULTIMEDIA, 2006, 13 (02) : 44 - 51
- [45] Detecting Malicious Websites in Depth through Analyzing Topics and Web-pages [J]. ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 128 - 133
- [46] Python']PythonHoneyMonkey: Detecting Malicious Web URLs on Client Side Honeypot Systems [J]. 2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
- [47] Detecting Malicious Inputs of Web Application Parameters using Character Class Sequences [J]. 39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 525 - 532
- [48] Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites [J]. COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2009, 10 : 24 - 33
- [49] Detecting malicious SQL [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2007, 4657 : 259 - +
- [50] Detecting the DGA-Based Malicious Domain Names [J]. TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 130 - 137