man-with-machine-harnessing-the-potential-of\
-artificial-intelligence. Retrieved 05-13-2021.
FreeBSD (2020). The FreeBSD Project. https://www.
freebsd.org/. Retrieved 04-01-2021.
Giordani, A. and Moschitti, A. (2012). Translating Ques-
tions to SQL Queries with Generative Parsers Dis-
criminatively Reranked. In Proc. of Intl. Conf. on
Computational Linguistics 2012: Posters - (COL-
ING), pages 401–410.
Gordon, M. and Harel, D. (2009). Generating Executable
Scenarios from Natural Language. In Intl. Conf. on
Computational Linguistics and Intelligent Text Pro-
cessing (CICLing), pages 456–467.
Hsiao, M. S. (2018). Automated Program Synthesis
from Object-Oriented Natural Language for Com-
puter Games. In Controlled Natural Language - Proc.
of the Sixth Intl. Workshop (CNL), pages 71–74.
HTMLCheatSheet (2019). JS CheatSheet. https://
htmlcheatsheet.com/js/. Retrieved 04-01-2021.
Ilic, J. (2019). Cross-Site Scripting (XSS)
Makes Nearly 40% of All Cyber Attacks in
2019. https://www.precisesecurity.com/articles/
cross-site-scripting-xss-makes-nearly-40-of\
-all-cyber-attacks-in-2019/. Retrieved 04-01-2021.
Iyer, S., Konstas, I., Cheung, A., and Zettlemoyer, L.
(2016). Summarizing Source Code using a Neural
Attention Model. In Proc. of the Assoc. for Compu-
tational Linguistics (Volume 1: Long Papers), pages
2073–2083.
Kingma, D. P. and Ba, J. (2014). Adam: A Method for
Stochastic Optimization. Intl. Conf. on Learning Rep-
resentations, pages 1–15.
Ling, W., Blunsom, P., Grefenstette, E., Hermann, K. M.,
Ko
ˇ
cisk
´
y, T., Wang, F., and Senior, A. (2016). Latent
Predictor Networks for Code Generation. In Proc. of
the Assoc. for Computational Linguistics (Volume 1:
Long Papers) (ACL), pages 599–609.
Ma’amari, M. (2018). NLP — Sequence to Sequence
Networks — Part 2 — Seq2Seq Model (En-
coderDecoder Model). https://towardsdatascience.
com/nlp-\sequence-to-sequence-networks-part-2\
-seq2seq-model-encoderdecoder-model-6c22e29fd7e1.
Mesellem, M. (2018). bWAPP - an extremely buggy web
app! http://www.itsecgames.com/. Retrieved 04-01-
2021.
Mohammadi, M., Chu, B., and Lipford, H. R. (2017). De-
tecting Cross-Site Scripting Vulnerabilities through
Automated Unit Testing. In 2017 Intl. Conf. on Soft-
ware Quality, Reliability and Security (QRS), pages
364–373.
Mokhov, S. A., Paquet, J., and Debbabi, M. (2014). The Use
of NLP Techniques in Static Code Analysis to Detect
Weaknesses and Vulnerabilities. In Canadian Conf.
on Artificial Intelligence (CAIAC), pages 326–332.
Neubig, G., Sperber, M., Wang, X., Felix, M., Matthews,
A., Padmanabhan, S., Qi, Y., Sachan, D., Arthur, P.,
Godard, P., Hewitt, J., Riad, R., and Wang, L. (2018).
XNMT: The eXtensible Neural Machine Translation
Toolkit. In Proc. of the 13th Conference of the Asso-
ciation for Machine Translation in the Americas (Vol-
ume 1: Research Track) (AMTA), pages 185–192.
Overflow”, S. (2020). ”stack Overflow: Where Developers
Learn Share & Build Careers”. https://stackoverflow.
com/. Retrieved 04-01-2021.
owasp (2017). OWASP Top Ten. https://owasp.org/
www-project-top-ten/. Retrieved 04-01-2021.
Owasp (2020). OWASP WebGoat - Learn the hack - Stop
the attack. https://owasp.org/www-project-webgoat/.
Retrieved 04-01-2021.
Payload Box (2019). Cross Site Scripting (XSS) Vulner-
ability Payload List. https://github.com/payloadbox/
xss-payload-list. Retrieved 04-01-2021.
Pedamallu”, H. (2020). ”RNN vs GRU vs
LSTM”. https://medium.com/analytics-vidhya/
rnn-vs-gru-vs-lstm-863b0b7b1573.
Samuel, M., Saxena, P., and Song, D. (2011). Context-
Sensitive Auto-Sanitization in Web Templating Lan-
guages Using Type Qualifiers. In Proc. of the As-
sociation for Computing Machinery Conf. on Com-
puter and Communications Security (ACM CCS),
page 587–600.
Selenium (2020). SeleniumHQ Browser Automation. https:
//www.selenium.dev/. Retrieved 04-01-2021.
”spaCy” (2020). ”spaCy · Industrial-strength Natural Lan-
guage Processing in Python”. https://spacy.io/.
Tatman”, R. (2019). ”Evaluating Text Output in NLP:
BLEU at your own risk”. https://towardsdatascience.
com/evaluating-text-output-in-nlp-bleu-at-your-\
own-risk-e8609665a213.
Transcrypt (2016). https://www.transcrypt.org/docs/html/
index.html. Retrieved 04-01-2021.
Vibhor Agrawal (2019). compile-run. https://www.npmjs.
com/package/compile-run. Retrieved 04-01-2021.
You, W., Zong, P., Chen, K., Wang, X., Liao, X., Bian, P.,
and Liang, B. (2017). SemFuzz: Semantics-Based
Automatic Generation of Proof-of-Concept Exploits.
In Proc. of the Conf. on Comp. and Comm. Security
(ACM CCS), page 2139–2154.
Zhang, M. and Yin, H. (2014). AppSealer: Automatic Gen-
eration of Vulnerability-Specific Patches for Prevent-
ing Component Hijacking Attacks in Android Appli-
cations. In Network and Distributed System Security
Symposium 2014 (NDSS).
HIJaX: Human Intent JavaScript XSS Generator
805