ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Contemplating Security of Http From SQL Injection and Cross Script
2017 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC)
◽
10.1109/iccic.2017.8524376
◽
2017
◽
Cited By ~ 1
Author(s):
Padma N. Joshi
◽
N. Ravishankar
◽
M.B. Raju
◽
N.CH. Ravi
Keyword(s):
Sql Injection
Download Full-text
Related Documents
Cited By
References
Evaluating the Modsecurity Web Application Firewall Against SQL Injection Attacks
2020 15th International Conference on Computer Engineering and Systems (ICCES)
◽
10.1109/icces51560.2020.9334626
◽
2020
◽
Author(s):
Basem Ibrahim Mukhtar
◽
Marianne A. Azer
Keyword(s):
Web Application
◽
Sql Injection
◽
Injection Attacks
◽
Sql Injection Attacks
Download Full-text
A Comprehensive Survey for Detection and Prevention of SQL Injection
2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS)
◽
10.1109/icaccs51430.2021.9442012
◽
2021
◽
Author(s):
Shreya Chowdhury
◽
Aakansh Nandi
◽
Miran Ahmad
◽
Aadish Jain
◽
Mohandas Pawar
Keyword(s):
Sql Injection
◽
Comprehensive Survey
Download Full-text
Raising Awareness for IT Security in Higher Education - A Teaching Experiment on SQL Injection for Non-Computer Science Majors
Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V. 2
◽
10.1145/3456565.3460035
◽
2021
◽
Author(s):
Vivien Weinfurter
◽
Amrei Sophia Kirmaier
◽
Philipp Brune
◽
Bianca Bergande
Keyword(s):
Higher Education
◽
Computer Science
◽
Teaching Experiment
◽
It Security
◽
Science Majors
◽
Sql Injection
◽
Raising Awareness
◽
Computer Science Majors
Download Full-text
A novel approach for detection of SQL injection and cross site scripting attacks
2015 International Conference on Pervasive Computing (ICPC)
◽
10.1109/pervasive.2015.7087131
◽
2015
◽
Cited By ~ 10
Author(s):
Piyush A. Sonewar
◽
Nalini A. Mhetre
Keyword(s):
Sql Injection
◽
Novel Approach
◽
Cross Site
Download Full-text
Risk assessment of SQL injection: An experimental study
2021 7th International Conference on Optimization and Applications (ICOA)
◽
10.1109/icoa51614.2021.9442630
◽
2021
◽
Author(s):
Rachid Ait daoud
◽
Karim Abouelmehdi
◽
Hayat Khaloufi
◽
Abderrahim Beni-hssane
Keyword(s):
Risk Assessment
◽
Experimental Study
◽
Sql Injection
Download Full-text
SQL Injection Attack Detection Framework Based on HTTP Traffic
10.1145/3472634.3474068
◽
2021
◽
Author(s):
ZhongDong Zhu
◽
ShiLin Jia
◽
JiShuai Li
◽
SuJuan Qin
◽
Hui Guo
Keyword(s):
Attack Detection
◽
Sql Injection
◽
Sql Injection Attack
Download Full-text
About SQL Injection Attack
SQL Injection Attacks
◽
10.1007/978-1-4842-6505-5_1
◽
2020
◽
Author(s):
Sunil Gupta
Keyword(s):
Sql Injection
◽
Sql Injection Attack
Download Full-text
Assessing the Impact of Firewalls and Database Proxies on SQL Injection Testing
Future Internet Testing - Lecture Notes in Computer Science
◽
10.1007/978-3-319-14121-3_2
◽
2014
◽
pp. 32-47
Author(s):
Dennis Appelt
◽
Nadia Alshahwan
◽
Lionel Briand
Keyword(s):
Sql Injection
◽
The Impact
Download Full-text
Detecting SQL Injection Vulnerabilities in Web Services
2009 Fourth Latin-American Symposium on Dependable Computing
◽
10.1109/ladc.2009.21
◽
2009
◽
Cited By ~ 30
Author(s):
Nuno Antunes
◽
Marco Vieira
Keyword(s):
Web Services
◽
Sql Injection
Download Full-text
Application of Hidden Markov Model in SQL Injection Detection
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)
◽
10.1109/compsac.2017.64
◽
2017
◽
Cited By ~ 5
Author(s):
Peng Li
◽
Lei Liu
◽
Jing Xu
◽
Hongji Yang
◽
Liying Yuan
◽
...
Keyword(s):
Markov Model
◽
Hidden Markov Model
◽
Hidden Markov
◽
Sql Injection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close