[1]
|
An Interpretive Saga of SQL Injection Attacks
|
|
Emerging Technologies in Data Mining and Information …,
2023 |
|
|
[2]
|
Securing web applications against SQL injection attacks-A Parameterised Query perspective
|
|
… and Business for …,
2023 |
|
|
[3]
|
Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks
|
|
2023 IEEE 8th International …,
2023 |
|
|
[4]
|
SQL Injection Attacks (SQLIA) detection and prevention methods using machine learning and traditional approach (A Comparison study)
|
|
Janab - NeuroQuantology,
2022 |
|
|
[5]
|
Security and Privacy in Metaverse: A Comprehensive Survey
|
|
Big Data Mining and Analytics,
2022 |
|
|
[6]
|
A Theory of Injection-Based Vulnerabilities in Formal Grammars
|
|
SSRN Electronic Journal,
2022 |
|
|
[7]
|
SQL injection and its detection using machine learning algorithms and BERT
|
|
… Conference on Cognitive Computing and Cyber …,
2022 |
|
|
[8]
|
A survey on SQL injection attacks, detection and prevention techniques-a tertiary study
|
|
International Journal of Security and …,
2022 |
|
|
[9]
|
Classification of SQL injection attack using K-Means clustering algorithm
|
|
AIP Conference …,
2022 |
|
|
[10]
|
CYBER ATTACKS-TRENDS, PATTERNS, AND SECURITY COUNTERMEASURES
|
|
2021 |
|
|
[11]
|
A Novel Approach for SQL Injection Avoidance Using Two-Level Restricted Application Prevention (TRAP) Technique
|
|
2021 |
|
|
[12]
|
Implementation and Analysis ModSecurity on Web-Based Application with OWASP Standards
|
|
JATISI (Jurnal Teknik …,
2021 |
|
|
[13]
|
PHP Development of Tourism Culture Website under the background of Modern Computer Network Technology
|
|
2021 2nd International Conference on Smart …,
2021 |
|
|
[14]
|
Hierarchical Database Construction and Retrieval
|
|
International …,
2020 |
|
|
[15]
|
A Novel Approach for SQL Injection Avoidance Using Two-Level Restricted Application Prevention (TRAP)
|
|
2020 |
|
|
[16]
|
WebApplication Vulnerabilities: Exploitation and Prevention
|
|
2020 |
|
|
[17]
|
Secure and anonymous authentication scheme for the Internet of Things with pairing
|
|
2020 |
|
|
[18]
|
Anomaly-Based Method for Detecting Multiple Classes of Network Attacks
|
|
2019 |
|
|
[19]
|
Analisi dell'equilibrio nell'applicazione della teoria dei giochi alle strategie di friendly jamming
|
|
2019 |
|
|
[20]
|
CODDLE: Code-Injection Detection With Deep Learning
|
|
2019 |
|
|
[21]
|
Detecting the Abnormal SQL Query Using Hybrid SVM Classification Technique in Web Application
|
|
2019 |
|
|
[22]
|
Обнаружение атаки SQL injection на веб-сервер без инспекции трафика
|
|
2018 |
|
|
[23]
|
Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking
|
|
2018 |
|
|
[24]
|
Design of a security system for Web Attacks
|
|
2018 |
|
|
[25]
|
PREVENTION OF DDoS AND SQL INJECTION ATTACK BY PREPARED STATEMENT AND IP BLOCKING.
|
|
Journal on Software Engineering,
2018 |
|
|
[26]
|
An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks: Intelligent SQLIA Vulnerability Analyzer Agent
|
|
International Journal of Intelligent Information Technologies (IJIIT),
2018 |
|
|
[27]
|
Prevention Structured Query Language Injection Using Regular Expression and Escape String
|
|
Procedia Computer Science,
2018 |
|
|
[28]
|
A comprehensive study of cyber attacks & counter measures for web systems
|
|
ICFNDS 2018 Proceedings of the 2nd International Conference on Future Networks and Distributed Systems,
2018 |
|
|
[29]
|
A study on web application security and detecting security vulnerabilities
|
|
2017 |
|
|
[30]
|
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications
|
|
Security and Communication Networks,
2017 |
|
|
[31]
|
BİLGİ SİSTEMLERİNDE GÜNCEL GÜVENLİK PROBLEMLERİ VE ÖNERİLEN ÇÖZÜMLER
|
|
TüBAV Bilim Dergisi,
2017 |
|
|
[32]
|
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications
|
|
Security and Communication Networks,
2017 |
|
|
[33]
|
SQL filtering: An effective technique to prevent SQL injection attack
|
|
2016 |
|
|
[34]
|
数据挖掘提取查询树特征的 SQL 注入攻击检测
|
|
电子技术应用,
2016 |
|
|
[35]
|
STUDY ON SQL INJECTION ATTACKS: MODE, DETECTION AND PREVENTION
|
|
International Journal of Engineering Applied Sciences and Technology ,
2016 |
|
|
[36]
|
ANALYSIS OF VARIOUS LEVELS OF PENETRATION BY SQL INJECTION TECHNIQUE THROUGH DVWA
|
|
Journal of Advanced Computing and Communication Technologies,
2016 |
|
|
[37]
|
Neutralizing SQL Injection Attack using Server Side Code Modification in Web Applications.
|
|
Security and Communication Networks,
2016 |
|
|
[38]
|
Analysis of various levels of penetration by SQL injection technique through DVWA'
|
|
2016 |
|
|
[39]
|
Assessing Web Services Robustness and Security Using Malicious Data Injection
|
|
2015 |
|
|
[40]
|
Detection and Prevention of SQL Injection Using Auto Comparator
|
|
2014 |
|
|