共 50 条
- [41] A Study on Web Application Security and Detecting Security Vulnerabilities [J]. 2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 451 - 455
- [42] A Solution to Improve Web Application Performance [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 2185 - 2188
- [44] APPLICATION OF GEOPHYSICAL TECHNIQUES TO POTASH MINING [J]. CIM BULLETIN, 1988, 81 (915): : 39 - 39
- [45] Overview: Web log Mining, Privacy Issues and Application of Web Log Mining [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 638 - 641
- [48] Web Usage Mining: A Review on Process, Methods and Techniques [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 40 - 46
- [49] Web Application Firewall Evasion Techniques [J]. 2020 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2020, : 194 - 199