共 50 条
- [1] Injection Attack Detection using the Removal of SQL Query Attribute Values [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (11): : 3831 - 3841
- [2] Detection of SQL Injection Attacks by Removing the Parameter Values of SQL Query [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 736 - 741
- [4] Detection Model for SQL Injection Attack: An Approach for Preventing a Web Application from the SQL Injection Attack [J]. 2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
- [5] SQL Injection Attack Detection Method using Expectation Criterion [J]. 2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 649 - 654
- [6] Detection Method of SQL injection Attack in Cloud Computing Environment [J]. PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 487 - 493
- [7] Prevention of SQL Injection Attack Using Query Transformation and Hashing [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 1317 - 1323
- [8] SQL Injection Attack Detection using ResNet [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
- [10] SQL Injection Attack Detection Framework Based on HTTP Traffic [J]. PROCEEDINGS OF ACM TURING AWARD CELEBRATION CONFERENCE, ACM TURC 2021, 2021, : 179 - 185