共 34 条
[1]
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
[J].
WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010),
2011, 3
[2]
[Anonymous], P IEEE INT S SEC SOF
[3]
[Anonymous], 2005, ASE 05 PROC 20 IEEEA
[4]
[Anonymous], 2012, INT J COMPUTER SCI I
[5]
Balasundaram I., 2011, INT J COMPUTER APPL, V19, P123
[6]
An Efficient Technique for Detection and Prevention of SQL Injection Attack using ASCII Based String Matching
[J].
INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND SYSTEM DESIGN 2011,
2012, 30
:183-190
[7]
Boyd SW, 2004, LECT NOTES COMPUT SC, V3089, P292
[8]
Burrows M., 1994, Algorithm, Data Compression, DOI 10.1.1.37.6774
[10]
Haldar V, 2005, 21st Annual Computer Security Applications Conference, Proceedings, P274