共 50 条
- [21] APPLICATION TO EXAMINE SQL INJECTION VULNERABILITIES AS A TOOL IN COMPUTER SCIENCE EDUCATION 12TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED), 2018, : 7404 - 7409
- [22] FaultArm: Detecting Fault Injection Vulnerabilities in Arm Assembly IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, : 285 - 290
- [24] Detecting SOQL-Injection Vulnerabilities in SalesForce Applications 2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 489 - 493
- [25] LogInjector: Detecting Web Application Log Injection Vulnerabilities APPLIED SCIENCES-BASEL, 2022, 12 (15):
- [26] Detecting Injection vulnerabilities in Executable Codes with Concolic Execution PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 50 - 57
- [27] Approach to detecting SQL injection behaviors in network environment Tongxin Xuebao/Journal on Communications, 2016, 37 (02): : 88 - 97
- [28] Detecting SQL Injection Attacks Using SNORT IDS 2014 ASIA-PACIFIC WORLD CONGRESS ON COMPUTER SCIENCE AND ENGINEERING (APWC ON CSE), 2014,
- [29] Detecting and Preventing SQL Injection Attacks: A Formal Approach 2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 123 - 129
- [30] SQL-Injection Vulnerabilities Resolving using Valid Security Tool in Cloud PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2019, 27 (01): : 159 - 174