共 50 条
- [22] Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 179 - 195
- [23] Test SQL Injection Vulnerabilities in Web Applications Based on Structure Matching 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 935 - 938
- [24] APPLICATION TO EXAMINE SQL INJECTION VULNERABILITIES AS A TOOL IN COMPUTER SCIENCE EDUCATION 12TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED), 2018, : 7404 - 7409
- [25] FaultArm: Detecting Fault Injection Vulnerabilities in Arm Assembly IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, : 285 - 290
- [27] Detecting SOQL-Injection Vulnerabilities in SalesForce Applications 2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 489 - 493
- [28] LogInjector: Detecting Web Application Log Injection Vulnerabilities APPLIED SCIENCES-BASEL, 2022, 12 (15):
- [29] Detecting Injection vulnerabilities in Executable Codes with Concolic Execution PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 50 - 57
- [30] Detecting SQL Injection Attacks Using SNORT IDS 2014 ASIA-PACIFIC WORLD CONGRESS ON COMPUTER SCIENCE AND ENGINEERING (APWC ON CSE), 2014,