[1] T. Vieira and C. Serrão, “Web Applications Security and Vulnerability Analysis Financial Web Applications Security Audit – A Case Study”, International Journal of Innovative Business Strategies (IJIBS), 3 (2016): 86-94.
[2] K. H. Lee and J. P. Park, “A Software Vulnerability Analysis System using Learning for Source Code Weakness History”, Journal of The Korea Academia Industrial cooperation Society, 18 (2017): 46-52, https://doi.org/10.5762/KAIS.2017.18.11.46.
[3] N. Provos, D. McNamee, P. Mavrommatis, K. Wang and N. Modadugu, “The ghost in the browser analysis of web-based malware”, In Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, (2007): 4-13.
[4] S. Wagner, D. M. Fernandez, S. Islam and K. Lochmann, “A Security Requirements Approach for Web Systems”, In Proceedings of Quality Assessment in Web (QAW2009), CEUR, (2009): 1-10.
[5] Korea Information & Security Agency (KISA), Recent Cyber Attack Trend, Information Sharing Seminar Report, (2014): 10-18.
[6] Korea Information & Security Agency (KISA), Large-scale malicious code distribution trend analysis report, (2014): 1-15.
[7] S. Y. Min, C. S. Jung, K. H. Lee, E. S. Cho, T. B. Yoon and S. H. You, “Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability”, Journal of The Korea Academia Industrial cooperation Society, 18 (2017): 1-8, https://doi.org/10.5762/KAIS.2017.18.7.1.
[8] S. H. Oh, T. E. Kim and H. K. Kim, “Technology Analysis on Automatic Detection and Defense of SW Vulnerabilities”, Journal of The Korea Academia Industrial cooperation Society, 18 (2017), 94-103, https://doi.org/10.5762/KAIS.2017.18.11.94.
[9] Korea Information & Security Agency (KISA), October trends: Cyber Security Issue, (2013): 31-42.
[10] The Open Web Application Security Project (OWASP), Available Online at http://www.owasp.org. Accessed in Sep. (2018).
[11] G Sai Asritha, “Security for files in Operating System” International Journal of Security Technology for Smart Device 3.2(2016): 1-6, http://dx.doi.org/10.21742/IJSTSD.2016.3.2.01.
[12] Vempati Sudheshna, “Adhoc Network Infrastructure Security” International Journal of Wireless and Mobile Communication for Industrial Systems 3.1(2016): 21-34, http://dx.doi.org/ 10.21742/IJWMCIS.2016.3.1.03.
[13] Asish Vardhan and M. Murali Krishna, “DGD: An Intrusion Detection System for Providing Security to Web Applications” Journal of Statistical Computing and Algorithm 1.1(2017): 27-32, http://dx.doi.org/10.21742/JSCA.2017.1.1.03.
[14] Lalit Mohan Joshi, and Dr. Rajendra Bharti, “A Research Paper on Online Security Issue with Data Tempering” International Journal of Security Technology for Smart Device 4.1(2017): 1-8, http://dx.doi.org/10.21742/IJSTSD.2017.4.1.01.
[15] SeongMuk, Choi, JoongHyo, Bok, HyungTaek, Lee, Jong Bae, Kim and Gwang Yong, Gim, “An Empirical Study on Crawler-based Security Control Systems” International Journal of Reliable Information and Assurance 5.2(2017): 7-12, http://dx.doi.org/10.21742/IJRIA.2017.5.2.02.