共 50 条
- [1] Specification and development of database applications based on Z and SQL [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 399 - +
- [2] Profiling database applications to detect SQL injection attacks [J]. 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 449 - +
- [3] Shrinking a Database to Perform SQL Mutation Tests Using an Evolutionary Algorithm [J]. 2013 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2013, : 2533 - 2539
- [4] As an Example in SQL SERVER Database Security Analysis [J]. ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 438 - 442
- [5] New SQL standard for object-relational database applications [J]. STANDARDIZATION AND INNOVATION IN INFORMATION TECHNOLOGY, PROCEEDINGS, 2003, : 191 - 203
- [6] Extracting Equivalent SQL from Imperative Code in Database Applications [J]. SIGMOD'16: PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2016, : 1781 - 1796
- [7] Mutation testing for java database applications [J]. Proceedings - 2nd International Conference on Software Testing, Verification, and Validation, ICST 2009, 2009, : 396 - 405
- [8] iConSMutate: Concolic Testing of Database Applications Using Existing Database States Guided by SQL Mutants [J]. 2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 479 - 484
- [9] Migrating from SQL to NOSQL Database: Practices and Analysis [J]. PROCEEDINGS OF THE 2018 13TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2018, : 58 - 62
- [10] A Review of Database Forensic Analysis For SQL Injection Attack [J]. VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 201 - 206