Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

A four-phase methodology for protecting web applications using an effective real-time technique
Nabeel Salih Ali
International Journal of Internet Technology and Secured Transactions (IJITST), 2016 Vol.6 No.4, pp.303 - 323
3 + 1 =

Thank you for your feedback.