A GERT model of an algorithm for analyzing security of a web application
Main Article Content
Abstract
Article Details
References
About The Open Web Application Security Project – OWASP, available at :
https://www.owasp.org/index.php/About_The_ Open_Web_Application_Security_Project (last accessed December 26, 2016).
Babincev, I. and Vuletic, D. (2016), “Web application security analysis using the kali Linux operating system”, Vojnotehnicki glasnik. Military Technical Courier, Vol. 64 № 2 available at : https://cyberleninka.ru/article/v/web-application-security-analysis-using-the-kali-linux-operating-system (last accessed December 26, 2016).
Baranov, P. and Beybutov E. (2015) “Securing information resources using Web application firewalls”, Business Informatics, No. 4 (34). pp. 71-78.
Edvards, G. (1980), Poslednyaya teorema Ferma. Geneticheskoye vvedeniye v algebraicheskuyu teoriyu chisel, Moskva : Mir, 486 p.
Gmurman, V.Ye. (2003), Teoriya veroyatnostey i matematicheskaya statistika, Moskva : Vysshaya shkola, 479 p.
Il'yenko, F.V. and Prikhod'ko, T.A. (2013), “Problemy uyazvimosti Web i sredstva dlya analiza bezopasnosti Web- prilozheniy”, Ínformatsíyní upravlyayuchí sistemi ta komp’yuterniy monítoring. Materiali III mizhnarodnoí naukovo- tekhnichnoí konferentsií studentiv, aspirantiv ta molodikh vchenikh, Donets'k, DonNTU, available at : http://masters.donntu. org/2013/fknt/ilyenko/library/sredstva_analiza_bezopasnosti_web_ilyenko_prixodko.pdf (last accessed December 26, 2016).
Category: OWASP Top Ten Project – OWASP, available at :
https://www.owasp.org/index.php/Category:OWASP_Top_ Ten_Project. (last accessed December 26, 2016).
Cohen, W., Ravikumar, P. and Fienberg S. A Comparison of String Metrics for Matching Names and Records, available at : https://www.cs.cmu.edu/afs/cs/Web/People/wcohen/postscript/kdd-2003-match-ws.pdf (last accessed December 26, 2016).
Pritsker, A.A.В. and Happ, W.W. {1966), GERT : “Part I. Fundamentals”, The Journal of Industrial Engineering.
Pritsker, A.A.В.(1979), Modeling and analysis using Q-GERT networks, New York: Wiley : Distributed by Halsted Press.
Semenov, S.G., Bos'ko, V.V. and Berezyuk, Í.A. (2012), “Issledovaniya veroyatnostno-vremennykh kharakteristik mul'tiservisnogo kanala svyazi s ispol'zovaniyem matematicheskogo apparata GERT-seti”, Sistemi obrobki ínformatsíí̈, Kharkiv : KHU PS, Vol. 1. Ic. 3 (101). – pp. 139–142.
Semenov, S.G. (2012), “Metodika matematicheskogo modelirovaniya zashchishchennoy ITS na osnove mnogosloynoy GERT-seti”, Vísnik Natsíonal'nogo tekhníchnogo uníversitetu «KPIt», KH.:NTU «Kharkívs'kiy polítekhníchniy ínstitut»,. № 62 (968), рр. 173–181.
Sung Gyeong Bae, Hyunghun Cho, Inho Lim and Sukyoung Ryu (2014) “SAFEWAPI: Web API Misuse Detector for Web Applications”, Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 507–517, available at : https://pdfs.semanticscholar.org/ (last accessed December 26, 2016).