Code injection (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Code injection" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
5th place
5th place
low place
low place
2nd place
2nd place
11th place
8th place
4th place
4th place
702nd place
520th place
18th place
17th place
355th place
454th place
2,187th place
1,500th place
207th place
136th place
low place
low place
1,514th place
1,024th place
low place
low place
low place
low place
222nd place
297th place
6th place
6th place
low place
low place
low place
low place
4,194th place
3,676th place
low place
low place
3,018th place
1,865th place
14th place
14th place
low place
low place

archive.org

archive.today

asu.edu

public.asu.edu

  • Srinivasan, Raghunathan. "Towards More Effective Virus Detectors" (PDF). Arizona State University. Archived from the original (PDF) on 29 July 2010. Retrieved 18 September 2010. Benevolent use of code injection occurs when a user changes the behaviour of a program to meet system requirements.

blackhat.life

doi.org

fort-knox.org

harvard.edu

ui.adsabs.harvard.edu

karmainsecurity.com

moertel.com

blog.moertel.com

nih.gov

ncbi.nlm.nih.gov

pubmed.ncbi.nlm.nih.gov

nist.gov

web.nvd.nist.gov

oracle.com

docs.oracle.com

owasp.org

php.net

uk3.php.net

portswigger.net

psu.edu

citeseerx.ist.psu.edu

rafalcieslak.wordpress.com

seclists.org

semanticscholar.org

api.semanticscholar.org

uiowa.edu

cs.uiowa.edu

upenn.edu

  • "Top 10 Web Application Security Vulnerabilities". Penn Computing. University of Pennsylvania. Archived from the original on 24 February 2018. Retrieved 10 December 2016.

web.archive.org

wiley.com

onlinelibrary.wiley.com

worldcat.org

search.worldcat.org