Why web 2.0 is good for learning and for research: principles and prototypes
Proceedings of the 17th international conference on World Wide Web
AIKED'08 Proceedings of the 7th WSEAS International Conference on Artificial intelligence, knowledge engineering and data bases
End-to-End Security for Enterprise Mashups
ICSOC-ServiceWave '09 Proceedings of the 7th International Joint Conference on Service-Oriented Computing
Towards health 2.0: mashups to the rescue
NGITS'09 Proceedings of the 7th international conference on Next generation information technologies and systems
Agents of responsibility--freelance web developers in web applications development
Information Systems Frontiers
Identification of potential malicious web pages
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
Analyzing and defending against web-based malware
ACM Computing Surveys (CSUR)
Extending HTTP models to Web 2.0 applications: the case of online social networks
International Journal of Computational Science and Engineering
Hi-index | 4.10 |
While Web 2.0's interactivity has made it very popular with users and Web site operators, the technology is also increasingly popular with hackers.