[1]
“A Review on Approaches for Web Application Vulnerabilities Detection”, IJAERD, vol. 2, no. 1, pp. 293–295, Jan. 2015, Accessed: Aug. 07, 2025. [Online]. Available: https://www.ijaerd.org/index.php/IJAERD/article/view/457