[1]
|
Emerging Technologies in Data Mining and Information Security
Lecture Notes in Networks and Systems,
2023
DOI:10.1007/978-981-19-4193-1_1
|
|
|
[2]
|
Security and Privacy in Metaverse: A Comprehensive Survey
Big Data Mining and Analytics,
2023
DOI:10.26599/BDMA.2022.9020047
|
|
|
[3]
|
Cognitive Computing and Cyber Physical Systems
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
2023
DOI:10.1007/978-3-031-28975-0_1
|
|
|
[4]
|
Securing web applications against SQL injection attacks - A Parameterised Query perspective)
2023 International Conference on Science, Engineering and Business for Sustainable Development Goals (SEB-SDG),
2023
DOI:10.1109/SEB-SDG57117.2023.10124613
|
|
|
[5]
|
A Theory of Injection-Based Vulnerabilities in Formal Grammars
SSRN Electronic Journal ,
2022
DOI:10.2139/ssrn.4135929
|
|
|
[6]
|
Classification of SQL injection attack using K-Means clustering algorithm
10TH INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY,
2022
DOI:10.1063/5.0104348
|
|
|
[7]
|
Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques
Journal of Big Data,
2022
DOI:10.1186/s40537-022-00678-0
|
|
|
[8]
|
PHP Development of Tourism Culture Website under the background of Modern Computer Network Technology
2021 2nd International Conference on Smart Electronics and Communication (ICOSEC),
2021
DOI:10.1109/ICOSEC51865.2021.9591731
|
|
|
[9]
|
International Conference on Innovative Computing and Communications
Advances in Intelligent Systems and Computing,
2021
DOI:10.1007/978-981-15-5113-0_17
|
|
|
[10]
|
WebApplication Vulnerabilities:Exploitation and Prevention
2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA),
2020
DOI:10.1109/ICIRCA48905.2020.9182928
|
|
|
[11]
|
Web Application Vulnerabilities: Exploitation and Prevention
2020 International Conference on Electrotechnical Complexes and Systems (ICOECS),
2020
DOI:10.1109/ICOECS50468.2020.9278437
|
|
|
[12]
|
Anomaly-Based Method for Detecting Multiple Classes of Network Attacks
Information,
2019
DOI:10.3390/info10030084
|
|
|
[13]
|
CODDLE: Code-Injection Detection With Deep Learning
IEEE Access,
2019
DOI:10.1109/ACCESS.2019.2939870
|
|
|
[14]
|
PREVENTION OF DDoS AND SQL INJECTION ATTACK BY
PREPARED STATEMENT AND IP BLOCKING
i-manager’s Journal on Software Engineering,
2018
DOI:10.26634/jse.12.3.14556
|
|
|
[15]
|
Prevention Structured Query Language Injection Using Regular Expression and Escape String
Procedia Computer Science,
2018
DOI:10.1016/j.procs.2018.08.218
|
|
|
[16]
|
A comprehensive study of cyber attacks & counter measures for web systems
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems - ICFNDS '18,
2018
DOI:10.1145/3231053.3231116
|
|
|
[17]
|
An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks
International Journal of Intelligent Information Technologies,
2018
DOI:10.4018/IJIIT.2018070104
|
|
|
[18]
|
A comprehensive study of cyber attacks & counter measures for web systems
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems,
2018
DOI:10.1145/3231053.3231116
|
|
|
[19]
|
Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications
Security and Communication Networks,
2017
DOI:10.1155/2017/3825373
|
|
|
[20]
|
A study on web application security and detecting security vulnerabilities
2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO),
2017
DOI:10.1109/ICRITO.2017.8342469
|
|
|