›› 2014, Vol. 14 ›› Issue (2): 0-0.

    Next Articles

Common Source Code Vulnerability Analysis and Research

ZHU Sheng-cai%XU Yu%WANG Huo-jian   

Abstract: source code security%application security%SQL injection%cross site scripting