Results 161 to 170 of about 12,963 (201)
Some of the next articles are maybe not open access.

An Approach for SQL Injection Vulnerability Detection

2009 Sixth International Conference on Information Technology: New Generations, 2009
Our research objective is to facilitate the identification of true input manipulation vulnerabilities via the combination of static analysis, runtime detection, and automatic testing. We propose an approach for SQL injection vulnerability detection, automated by a prototype tool SQLInjectionGen.
openaire   +1 more source

Understanding and Discovering SQL Injection Vulnerabilities

2017
The Internet has become very important today and a large part of everyday life, so it is vital to focus on security for web applications and mobile services, so as to protect electronic commerce, electronic government, social media and all electronic services that transfer information through it.
Abdullaziz A. Sarhan   +2 more
openaire   +1 more source

Επιθέσεις SQL injection

Η διπλωματική εργασία Επιθέσεις SQL Injection αναλύει τις επιθέσεις SQL Injection, τις μεθόδους που χρησιμοποιούνται, τις επιπτώσεις τους και τους τρόπους αντιμετώπισης. Αρχικά, παρουσιάζεται η γλώσσα SQL και οι κύριες κατηγορίες εντολών της (DDL, DML, DCL, TCL), που χρησιμοποιούνται για τη διαχείριση και τον έλεγχο των βάσεων δεδομένων.
openaire   +1 more source

SQL-Injection Vulnerability Scanning Tool for Automatic Creation of SQL-Injection Attacks

International Journal of Advances in Engineering and Management
This research introduces an advanced automated scanning tool for detecting and analyzing SQL injection vulnerabilities in web applications, addressing the critical need for robust security testing mechanisms in modern web development. The proposed tool employs sophisticated dynamic analysis techniques combined with machine learning algorithms to ...
B. Kalaiselvi B. Kalaiselvi   +3 more
openaire   +1 more source

A systematic review of detection and prevention techniques of SQL injection attacks

Information Security Journal, 2023
Mohammed Nasereddin   +2 more
exaly  

SQL Injection Attacks

2011
Denny Cherry, Thomas Larock
openaire   +2 more sources

Home - About - Disclaimer - Privacy