共 16 条
- [1] [Anonymous], 2005, INPROCEEDINGS 20 IEE
- [2] Basta C, 2016, INT J ADV COMPUT SC, V7, P129
- [3] Runtime Monitors to Detect and Prevent Union Query based SQL Injection Attacks [J]. PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, : 357 - 362
- [4] Farooq U., 2020, Int J Eng Res Technol (IJERT), V9, P359
- [5] Jagadessan J., 2019, INT J ENG ADV TECHNO, V8, P791
- [6] Joshi A, 2014, 2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), P1111, DOI 10.1109/ICCICCT.2014.6993127
- [7] Kar D, 2016, PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, P1, DOI 10.1109/ICETECH.2016.7569180
- [8] Kaur M., 2012, IOSR J COMPUTER ENG, V1, P31
- [9] Kranthikumar B, 2020, J Xi'an Univ Archit Technol, V7, P800
- [10] Detecting Web Attacks Using Multi-Stage Log Analysis [J]. 2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 733 - 738