|
[1] Web statistics report. https://whitehatsec.com/categories/statisticsreport. [2] Ldap injection owasp. https://www.owasp.org/index.php/LDAP_injection. [3] Xml injection owasp. https://www.owasp.org/index.php/Testing_for_ XML_Injection_(OWASP-DV-008). [4] Local file inclusion injection owasp. https://www.owasp.org/index.php/ Testing_for_Local_File_Inclusion. [5] Static analysis wikipedia. https://en.wikipedia.org/wiki/Static_ program_analysis. [6] Dynamic analysis wikipedia. https://en.wikipedia.org/wiki/Dynamic_ program_analysis. [7] Abstract syntax tree wikipedia. https://en.wikipedia.org/wiki/Abstract_ syntax_tree. [8] Machine learning wikipedia. https://en.wikipedia.org/wiki/Machine_ learning. [9] Andy Liaw and Matthew Wiener. Classification and regression by randomforest. R news, 2(3):18–22, 2002. [10] Naive bayes wikipedia. https://en.wikipedia.org/wiki/Naive_Bayes_ classifier. [11] Irina Rish. An empirical study of the naive bayes classifier. In IJCAI 2001 workshop on empirical methods in artificial intelligence, volume 3, pages 41–46. IBM New York, 2001. [12] Svm wikipedia. https://en.wikipedia.org/wiki/Support_vector_ machine. [13] Chih-Chung Chang and Lin CJ LIBSVM. a library for support vector machines, 2001. Software available at http://www. csie. ntu. edu. tw/cjlin/libsvm, 2012. [14] Bertrand Stivalet and Elizabeth Fong. Large scale generation of complex and faulty php test cases. In Software Testing, Verification and Validation (ICST), 2016 IEEE International Conference on, pages 409–415. IEEE, 2016. [15] Riccardo Scandariato, James Walden, Aram Hovsepyan, and Wouter Joosen. Predicting vulnerable software components via text mining. IEEE Transactions on Software Engineering, 40(10):993–1006, 2014. [16] Lwin Khin Shar and Hee Beng Kuan Tan. Predicting sql injection and cross site scripting vulnerabilities through mining input sanitization patterns. Information and Software Technology, 55(10):1767–1780, 2013. [17] James Walden, Jeff Stuckman, and Riccardo Scandariato. Predicting vulnerable components: Software metrics vs text mining. In Software Reliability Engineering (ISSRE), 2014 IEEE 25th International Symposium on, pages 23–33. IEEE, 2014. [18] Mukesh Kumar Gupta, Mahesh Chandra Govil, and Girdhari Singh. Predicting cross-site scripting (xss) security vulnerabilities in web applications. In Computer Science and Software Engineering (JCSSE), 2015 12th International Joint Conference on, pages 162–167. IEEE, 2015. [19] Ibéria Medeiros, Nuno F Neves, and Miguel Correia. Automatic detection and correction of web application vulnerabilities using data mining to predict false positives. In Proceedings of the 23rd international conference on World wide web, pages 63–74. ACM, 2014. [20] Adam Kieyzun, Philip J Guo, Karthick Jayaraman, and Michael D Ernst. Automatic creation of sql injection and cross-site scripting attacks. In Software Engineering, 2009. ICSE 2009. IEEE 31st International Conference on, pages 199–209. IEEE, 2009. [21] Shih-Kun Huang, Han-Lin Lu, Wai-Meng Leong, and Huan Liu. Craxweb: Automatic web application testing and attack generation. In Software Security and Reliability (SERE), 2013 IEEE 7th International Conference on, pages 208–217. IEEE, 2013. [22] Lwin Khin Shar, Hee Beng Kuan Tan, and Lionel C Briand. Mining sql injection and cross site scripting vulnerabilities using hybrid program analysis. In Proceedings of the 2013 International Conference on Software Engineering, pages 642–651. IEEE Press, 2013. [23] Abstract syntax tree for php. https://pypi.python.org/pypi/phply. [24] Abstract syntax tree for javascript. https://pypi.python.org/pypi/slimit. [25] re package of python. https://docs.python.org/2/library/re.html. [26] os package of python. https://docs.python.org/2/library/os.html. [27] sys package of python. https://docs.python.org/2/library/sys.html. [28] json package of python. https://docs.python.org/2/library/json.html. [29] Regular expression of python. https://docs.python.org/2/library/copy. html. [30] Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H Witten. The weka data mining software: an update. ACM SIGKDD explorations newsletter, 11(1):10–18, 2009. [31] Ecma. https://www.ecma-international.org/. [32] Npm. https://www.npmjs.com/. [33] Cross-validation wikipedia. https://en.wikipedia.org/wiki/Crossvalidation_( statistics). [34] Confusion matrix. https://en.wikipedia.org/wiki/Confusion_matrix. |