{"created":"2020-09-01T15:14:46.921211+00:00","id":4661,"links":{},"metadata":{"_buckets":{"deposit":"50c31dc4-d5da-449c-acf2-232e7678a362"},"_deposit":{"id":"4661","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4661"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4661","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Defensive Analysis on Web-Application Input Validation for Advanced Persistent Threat (APT) Attack `","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Nowadays, any kinds of cyber-attacks arefirstly attacked to web site and the site containsinformation about business, government andother organizations. So, the role of web pagesecurity is becoming the essential part of cybersecurity. Most of the web pages are suffered fromattacks such as Advanced Persistent Threat(APT). An APT is an extended campaigntargeted at a specific organization to achieve aclear objective. Most of the web pages havemuch vulnerability due to insecure source codes.In this paper, it will be defined web pagevulnerabilities on PHP source code. It will becollected the attacks from the scenarios. Theresult can be concluded the attack vectors via thesource code. Each level of source code can begenerated by the attributes of source code. Theseattributes can be measured in order to securesource codes and can be evaluated by measuringthe vulnerabilities metrics."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"201642.pdf","filesize":[{"value":"110 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4661/files/201642.pdf"},"version_id":"e6d0890d-836e-4aef-a28a-f92ff433b428"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourteenth International Conference On Computer Applications (ICCA 2016)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, Tun Myat"},{"subitem_authors_fullname":"Oo, Myo Myint"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2016-02-25"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/314"},"item_title":"Defensive Analysis on Web-Application Input Validation for Advanced Persistent Threat (APT) Attack `","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"4661","relation_version_is_last":true,"title":["Defensive Analysis on Web-Application Input Validation for Advanced Persistent Threat (APT) Attack `"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:12:52.800074+00:00"}