共 50 条
- [1] Source Code Patterns of SQL Injection Vulnerabilities PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
- [2] A Machine Learning based Approach to Identify SQL Injection Vulnerabilities 34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, : 1286 - 1288
- [3] An Improved Approach for SQL Injection Vulnerabilities Detection INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3017 - 3020
- [4] A Mutation Approach of Detecting SQL Injection Vulnerabilities CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 175 - 188
- [5] A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 379 - 386
- [7] Code-motion for API migration: Fixing SQL injection vulnerabilities in Java WRT 2011 - Proceedings of the 4th Workshop on Refactoring Tools, co-located with ICSE 2011, 2011, : 1 - 7
- [8] Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 179 - 195
- [9] Security Testing of Web Applications: A Search-Based Approach for Detecting SQL Injection Vulnerabilities PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCCO'19 COMPANION), 2019, : 417 - 418
- [10] Detecting Vulnerabilities in Source Code Using Machine Learning PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON APPLIED CYBER SECURITY (ACS) 2021, 2022, 378 : 35 - 41