共 81 条
[1]
Abdullah Himli S., 2020, Academic Journal of Nawroz University, V9, P47, DOI 10.25007/ajnu.v9n1a532
[3]
Alsaleh M., 2017, English. Security and Communication Networks, V2017, P1, DOI [10.1155/2017/6158107, DOI 10.1155/2017/6158107]
[4]
[Anonymous], VOJNOTEHNICKI GLASNI
[5]
Antunes Nuno, 2010, 2010 IEEE International Conference on Web Services (ICWS), P203, DOI 10.1109/ICWS.2010.76
[7]
Detecting SQL Injection Vulnerabilities in Web Services
[J].
LADC: 2009 4TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING,
2009,
:17-24
[8]
Awad M., 2019, Telkomnika (Telecommun. Comput. Electron. Control), V17, P852, DOI [10.12928/telkomnika.v17i2.10484, DOI 10.12928/TELKOMNIKA.V17I2.10484]
[9]
Aziz NA, 2016, 2016 INTERNATIONAL CONFERENCE ON INFORMATICS AND COMPUTING (ICIC), P164, DOI 10.1109/IAC.2016.7905709
[10]
Baral P, 2011, IEEE POTENTIALS, V30, P10, DOI 10.1109/MPOT.2010.939449