Research on second-order SQL injection techniques

被引:0
|
作者
Scholl of Computer Science and Engineering, Changshu Institute of Technology, Changshu [1 ]
215500, China
不详 [2 ]
362021, China
机构
来源
关键词
Attack payload - Injection techniques - Second orders - SQL injection - Sql injection attacks - WEB application - Web technologies;
D O I
10.11959/j.issn.1000-436x.2015285
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] First Aid for Climate Research with Second-Order Science
    Krauss, Werner
    CONSTRUCTIVIST FOUNDATIONS, 2014, 10 (01): : 132 - 133
  • [22] Second-Order Science, Unity of Science and Methods of Research
    Hornung, Bernd R.
    CONSTRUCTIVIST FOUNDATIONS, 2014, 10 (01): : 30 - 31
  • [23] Quality in Action Research: Reflections for Second-Order Inquiry
    Marti, Joel
    Villasante, Tomas R.
    SYSTEMIC PRACTICE AND ACTION RESEARCH, 2009, 22 (05) : 383 - 396
  • [25] Quality in Action Research: Reflections for Second-Order Inquiry
    Joel Martí
    Tomás R. Villasante
    Systemic Practice and Action Research, 2009, 22 : 383 - 396
  • [26] A Second-Order Growth Mixture Model for Developmental Research
    Grimm, Kevin J.
    Ram, Nilam
    RESEARCH IN HUMAN DEVELOPMENT, 2009, 6 (2-3) : 121 - 143
  • [27] Vector Random Fields with Second-Order Moments or Second-Order Increments
    Ma, Chunsheng
    STOCHASTIC ANALYSIS AND APPLICATIONS, 2011, 29 (02) : 197 - 215
  • [28] Natural second-order observers for second-order distributed parameter systems
    Demetriou, MA
    SYSTEMS & CONTROL LETTERS, 2004, 51 (3-4) : 225 - 234
  • [29] Second-order observer for a class of second-order distributed parameter systems
    Nguyen, Tu Duc
    Egeland, Olav
    PROCEEDINGS OF THE 45TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2006, : 3950 - 3955
  • [30] Adaptive Control of Second-Order Nonlinear Systems With Injection and Deception Attacks
    Yang, Yue
    Huang, Jiangshuai
    Su, Xiaojie
    Wang, Kai
    Li, Guoqi
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (01): : 574 - 581