共 29 条
[1]
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
[J].
WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010),
2011, 3
[5]
ARAZ: A software modules clustering method using the combination of particle swarm optimization and genetic algorithms
[J].
INTELLIGENT DECISION TECHNOLOGIES-NETHERLANDS,
2020, 14 (04)
:449-462
[6]
Buehrer G., 2005, Proceedings of the 5th international workshop on Software engineering and middleware, P106, DOI [10.1145/1108473.1108496., DOI 10.1145/1108473.1108496]
[7]
Buja Geogiana, 2014, 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), P60, DOI 10.1109/ISCAIE.2014.7010210
[8]
Clarke J., 2012, SQL Injection Attacks and Defense, V2nd ed., P409
[9]
JDBC checker: A static analysis tool for SQL/JDBC applications
[J].
ICSE 2004: 26TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS,
2004,
:697-698
[10]
Research on the Technology of Detecting the SQL Injection Attack and Non-Intrusive Prevention in WEB System
[J].
MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I,
2017, 1839