共 29 条
- [1] SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks [J]. WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
- [4] Highly Available and Dependable E-learning Services Using Grid System [J]. 3RD CYPRUS INTERNATIONAL CONFERENCE ON EDUCATIONAL RESEARCH (CY-ICER 2014), 2014, 143 : 471 - 476
- [5] Developing Inherently Resilient Software Against Soft-Errors Based on Algorithm Level Inherent Features [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2014, 30 (02): : 193 - 212
- [6] Bouyer A, 2007, IADIS INT C APPL COM
- [7] Buehrer G., 2005, Proc. of 5th international workshop on Software engineering and middleware (SEM'05), (New York, NY, P106
- [8] Buja Geogiana, 2014, 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), P60, DOI 10.1109/ISCAIE.2014.7010210
- [9] JDBC checker: A static analysis tool for SQL/JDBC applications [J]. ICSE 2004: 26TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2004, : 697 - 698
- [10] Research on the Technology of Detecting the SQL Injection Attack and Non-Intrusive Prevention in WEB System [J]. MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839