共 50 条
- [1] A Mutation Approach of Detecting SQL Injection Vulnerabilities [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 175 - 188
- [2] Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, 2009, : 260 - 267
- [3] A Machine Learning based Approach to Identify SQL Injection Vulnerabilities [J]. 34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, : 1286 - 1288
- [4] Understanding and Discovering SQL Injection Vulnerabilities [J]. ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 45 - 51
- [5] An approach for SQL injection vulnerability detection [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1411 - 1414
- [6] A New Approach for SQL-Injection Detection [J]. INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 245 - 254
- [7] Correlation Approach for SQL Injection Attacks Detection [J]. INTERNATIONAL JOINT CONFERENCE CISIS'12 - ICEUTE'12 - SOCO'12 SPECIAL SESSIONS, 2013, 189 : 177 - +
- [8] A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications [J]. FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 379 - 386
- [9] Source Code Patterns of SQL Injection Vulnerabilities [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
- [10] Detecting SQL Injection Vulnerabilities in Web Services [J]. LADC: 2009 4TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING, 2009, : 17 - 24