|
[1] Dan. (2011, Aug 8) How Big is a Large Website? [Online]. Available: http://contentini.com/how-big-is-a-large-website-planning-the-content-audit-app/ [2] T. Bennouas and F. de Montgolfier, “Random web crawls,” in Proc. 16th Int. Conf. World Wide Web, 2007, pp. 451–460. [3] Y.-W. Huang, S.-K. Huang, T.-P. Lin, and C.-H. Tsai, “Web application security assessment by fault injection and behavior monitoring,” in Proc. 12th Int. Conf. World Wide Web, 2003, pp. 148–159. [4] S. M. Mirtaheri et al., “A Brief History of Web Crawlers,” in Proc. 2013 Conf. Center for Advanced Studies on Collaborative Research, 2013, pp. 40–54. [5] S. Gupta and K. Bhatia, “A Comparative Study of Hidden Web Crawlers,” Int. J. Comput. Trends Technol., vol. 12, 2014. [6] E. İ. Tatli and B. Urgun, “WIVET—Benchmarking Coverage Qualities of Web Crawlers,” Computer J., vol. 60, no 4, pp. 555-572, Sep. 2016. Available: https://github.com/bedirhan/wivet [7] A. M. Fard and A. Mesbah, “Feedback-Directed Exploration of Web Applications to Derive Test Models,” in Proc. 2013 IEEE 24th Int. Symp. Software Reliability Engineering, pp 278-287 [8] G. Pellegrino et al., “jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications”, in Proc. 18th Int. Symp. Research in Attacks, Intrusions, and Defenses, 2015, pp 295-316. [9] A. Mesbah et al., “Crawling Ajax-based Web Applications through Dynamic Analysis of User Interface State Changes”, ACM Transactions on the Web, vol. 6, no. 1, Mar. 2012. [10] A. Huiyao et al., “A New Architecture of Ajax Web Application Security Crawler with Finite-State Machine”, in Proc. 6th Int. Conf. Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014. [11] T. Fu et al., “Sentimental Spidering: Leveraging Opinion Information in Focused Crawlers,” ACM Trans. Inf. Syst., vol. 30, no. 4, pp. 1–30, Nov. 2012. [12] S. Xu et al., “A user-oriented web crawler for selectively acquiring online content in e-health research.,” Bioinformatics, vol. 30, no. 1, pp. 104–14, Jan. 2014. [13] R. Baeza-Yates et al., “Crawling a Country: Better Strategies than Breadth-First for Web Page Ordering,” in Proc. of the 14th Int. Conf. World Wide Web, 2005, pp. 864–872. [14] IETF. (1994). RFC 1738 – Uniform Resource Locator [Online]. Available: https://www.ietf.org/rfc/rfc1738.txt [15] WAVSEP. (2016, Sept. 18) The WIVET Coverage Ranking of Web Application Vulnerability Scanners [Online] Available: http://sectoolmarket.com/wivet-score-unified-list.html [16] W3C. (2017, Mar. 30) WebDriver [Online] Available: https://www.w3.org/TR/webdriver/ [17] IETF. (1994). RFC 1738 – Uniform Resource Locator [Online]. Available: https://www.ietf.org/rfc/rfc1738.txt
|