@incollection{, 77861F1D54ED676CA4D9474457BA2633 , author={{icomTechnologies} and {VenkatramuluSunkari} and {Dr. C.V GuruRao} and {kits warangal}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1427782 } @book{b0, , title={{Feb) Software assurance tools: Web application security scanner. Functional Specification Version 1.0}} , author={{ PE }} , year={2008} } @incollection{b1, , title={{Eliminating SQL Injection Attacks -A Transparent Defense Mechanism}} , author={{ MMuthuprasanna } and { KWei } and { SKothari }} , booktitle={{International Workshop on Web Site Evolution}} , year={2006} } @incollection{b2, , title={{MUSIC: Mutationbased SQL Injection Vulnerability Checking}} , author={{ HShahriar } and { MZulkernine }} , booktitle={{International Conference on Quality Software}} , year={2008} } @incollection{b3, , title={{SQL DOM: compile time checking of dynamic SQL statements}} , author={{ RAMcclure } and { IHKrger }} , booktitle={{International Conference on Software Engineering}} , year={2005} } @incollection{b4, , title={{Analysis of the effect of Java software faults on security vulnerabilities and their detection by commercial web vulnerability scanner tool}} , author={{ TBasso } and { PC SFernandes } and { MJino } and { RMoraes }} , booktitle={{International Conference on Dependable Systems and Networks Workshops}} , year={2010} } @incollection{b5, , title={{Countermeasure Techniques for Deceptive Phishing Attack}} , author={{ HHuang } and { JTan } and { LLiu }} , booktitle={{International Conference on New Trends in Information and Service Science}} , year={2009} } @incollection{b6, , title={{Security Protocol Testing Using Attack Trees}} , author={{ AN PMorais } and { EMartins } and { ARCavalli } and { WJimenez }} , booktitle={{IEEE International Conference on Computational Science and Engineering}} , year={2009} } @incollection{b7, , title={{Shielding against SQL Injection Attacks Using ADMIRE Model}} , author={{ SMadan } and { SMadan }} , booktitle={{International Conference on Computational Intelligence, Communication Systems and Networks}} , year={2009} } @incollection{b8, , title={{System level security modeling using attack trees}} , author={{ PAKhand }} , booktitle={{International Conference on Computer}} , year={2009} } @incollection{b9, , title={{Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)}} , author={{ NJovanovic } and { CKruegel } and { EKirda }} , booktitle={{IEEE Symposium on Security and Privacy}} , year={2006} } @incollection{b10, , title={{Detecting Security Vulnerabilities with Software Architecture Analysis Tools}} , author={{ KKarppinen } and { MLindvall } and { LYonkwa }} , booktitle={{International Conference on Software Testing, Verification, and Validation}} , year={2008} }