Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: SQLIVS.

Zeitschriftenartikel zum Thema „SQLIVS“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "SQLIVS" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Berry, Donna L., Brent A. Blumenstein, Barbara Halpenny, Seth Wolpin, Jesse R. Fann, Mary Austin-Seymour, Nigel Bush, Bryant T. Karras, William B. Lober und Ruth McCorkle. „Enhancing Patient-Provider Communication With the Electronic Self-Report Assessment for Cancer: A Randomized Trial“. Journal of Clinical Oncology 29, Nr. 8 (10.03.2011): 1029–35. http://dx.doi.org/10.1200/jco.2010.30.3909.

Der volle Inhalt der Quelle
Annotation:
Purpose Although patient-reported cancer symptoms and quality-of-life issues (SQLIs) have been promoted as essential to a comprehensive assessment, efficient and efficacious methods have not been widely tested in clinical settings. The purpose of this trial was to determine the effect of the Electronic Self-Report Assessment–Cancer (ESRA-C) on the likelihood of SQLIs discussed between clinicians and patients with cancer in ambulatory clinic visits. Secondary objectives included comparison of visit duration between groups and usefulness of the ESRA-C as reported by clinicians. Patients and Methods This randomized controlled trial was conducted in 660 patients with various cancer diagnoses and stages at two institutions of a comprehensive cancer center. Patient-reported SQLIs were automatically displayed on a graphical summary and provided to the clinical team before an on-treatment visit (n = 327); in the control group, no summary was provided (n = 333). SQLIs were scored for level of severity or distress. One on-treatment clinic visit was audio recorded for each participant and then scored for discussion of each SQLI. We hypothesized that problematic SQLIs would be discussed more often when the intervention was delivered to the clinicians. Results The likelihood of SQLIs being discussed differed by randomized group and depended on whether an SQLI was first reported as problematic (P = .032). Clinic visits were similar with regard to duration between groups, and clinicians reported the summary as useful. Conclusion The ESRA-C is the first electronic self-report application to increase discussion of SQLIs in a US randomized clinical trial.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Fu, Houlong, Chun Guo, Chaohui Jiang, Yuan Ping und Xiaodan Lv. „SDSIOT: An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic“. Electronics 12, Nr. 11 (30.05.2023): 2472. http://dx.doi.org/10.3390/electronics12112472.

Der volle Inhalt der Quelle
Annotation:
An SQL Injection Attack (SQLIA) is a major cyber security threat to Web services, and its different stages can cause different levels of damage to an information system. Attackers can construct complex and diverse SQLIA statements, which often cause most existing inbound-based detection methods to have a high false-negative rate when facing deformed or unknown SQLIA statements. Although some existing works have analyzed different features for the stages of SQLIA from the perspectives of attackers, they primarily focus on stage analysis rather than different stages’ identification. To detect SQLIA and identify its stages, we analyze the outbound traffic from the Web server and find that it can differentiate between SQLIA traffic and normal traffic, and the outbound traffic generated during the two stages of SQLIA exhibits distinct characteristics. By employing 13 features extracted from outbound traffic, we propose an SQLIA detection and stage identification method based on outbound traffic (SDSIOT), which is a two-phase method that detects SQLIAs in Phase I and identifies their stages in Phase II. Importantly, it does not need to analyze the complex and diverse malicious statements made by attackers. The experimental results show that SDSIOT achieves an accuracy of 98.57% for SQLIA detection and 94.01% for SQLIA stage identification. Notably, the accuracy of SDSIOT’s SQLIA detection is 8.22 percentage points higher than that of ModSecurity.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Sun, San-Tsai, und Konstantin Beznosov. „Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks“. International Journal of Secure Software Engineering 1, Nr. 1 (Januar 2010): 20–40. http://dx.doi.org/10.4018/jsse.2010102002.

Der volle Inhalt der Quelle
Annotation:
This article presents an approach for retrofitting existing Web applications with run-time protection against known, as well as unseen, SQL injection attacks (SQLIAs) without the involvement of application developers. The precision of the approach is also enhanced with a method for reducing the rate of false positives in the SQLIA detection logic, via runtime discovery of the developers’ intention for individual SQL statements made by Web applications. The proposed approach is implemented in the form of protection mechanisms for J2EE, ASP.NET, and ASP applications. Named SQLPrevent, these mechanisms intercept HTTP requests and SQL statements, mark and track parameter values originating from HTTP requests, and perform SQLIA detection and prevention on the intercepted SQL statements. The AMNESIA testbed is extended to contain false-positive testing traces, and is used to evaluate SQLPrevent. In our experiments, SQLPrevent produced no false positives or false negatives, and imposed a maximum 3.6% performance overhead with 30 milliseconds response time for the tested applications.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Ablahd, Ann, und Suhair Dawwod. „Using Flask for SQLIA Detection and Protection“. Tikrit Journal of Engineering Sciences 27, Nr. 2 (15.05.2020): 1–14. http://dx.doi.org/10.25130/tjes.27.2.01.

Der volle Inhalt der Quelle
Annotation:
At present the web applications are used for most of the life activities, these applications are affected by an attack called (Structure Query Language Injection Attack) SQLIA due to the vulnerabilities of the web application. The vulnerabilities of the web application are increased because most of application developers do not care to security in designing.SQL injection is a common attack that infects a web application. The attacker adds (Structured Query Language) SQL code to web page for accessing and changing victim databases.The vital step in securing the database and detecting such an attack in web apps is preparing a tool. Many researchers propose different ways for detection and prevention of such as an attack. In this paper a tool it proposed using a powerful micro-framework web application designer called Flask in Python 3.7 to detect and prevent such attacks. The proposed system is called SQLIAD. SQLIAD analyzed a web application on-line.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Gaffney, Kevin P., Martin Prammer, Larry Brasfield, D. Richard Hipp, Dan Kennedy und Jignesh M. Patel. „SQLite“. Proceedings of the VLDB Endowment 15, Nr. 12 (August 2022): 3535–47. http://dx.doi.org/10.14778/3554821.3554842.

Der volle Inhalt der Quelle
Annotation:
In the two decades following its initial release, SQLite has become the most widely deployed database engine in existence. Today, SQLite is found in nearly every smartphone, computer, web browser, television, and automobile. Several factors are likely responsible for its ubiquity, including its in-process design, standalone codebase, extensive test suite, and cross-platform file format. While it supports complex analytical queries, SQLite is primarily designed for fast online transaction processing (OLTP), employing row-oriented execution and a B-tree storage format. However, fueled by the rise of edge computing and data science, there is a growing need for efficient in-process online analytical processing (OLAP). DuckDB, a database engine nicknamed "the SQLite for analytics", has recently emerged to meet this demand. While DuckDB has shown strong performance on OLAP benchmarks, it is unclear how SQLite compares. Furthermore, we are aware of no work that attempts to identify root causes for SQLite's performance behavior on OLAP workloads. In this paper, we discuss SQLite in the context of this changing workload landscape. We describe how SQLite evolved from its humble beginnings to the full-featured database engine it is today. We evaluate the performance of modern SQLite on three benchmarks, each representing a different flavor of in-process data management, including transactional, analytical, and blob processing. We delve into analytical data processing on SQLite, identifying key bottlenecks and weighing potential solutions. As a result of our optimizations, SQLite is now up to 4.2X faster on SSB. Finally, we discuss the future of SQLite, envisioning how it will evolve to meet new demands and challenges.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Ateeq Mohammed Draib, Najla’a, Abu Bakar Md Sultan, Abdul Azim B Abd Ghani und Hazura Zulzalil. „Comparison of Security Testing Approaches for Detection of SQL Injection Vulnerabilities“. International Journal of Engineering & Technology 7, Nr. 4.1 (12.09.2018): 14. http://dx.doi.org/10.14419/ijet.v7i4.1.19483.

Der volle Inhalt der Quelle
Annotation:
Structured query language injection vulnerability (SQLIV) is one of the most prevalent and serious web application vulnerabilities that can be exploited by SQL injection attack (SQLIA) to gain unauthorized access to restricted data, bypass authentication mechanism, and execute unauthorized data manipulation language. Hence, testing web applications for detecting such vulnerabilities is very imperative. Recently, several security testing approaches have been proposed to detect SQL injection vulnerabilities. However, there is no up-to-date comparative study of these approaches that could be used to help security practitioners and researchers in selecting an appropriate approach for their needs.In this paper, six criteria's are identified to compare and analyze security testing approaches; vulnerability covered, testing approach, tool automation, false positive mitigation, vulnerability fixing, and test case/data generation. Using these criteria, a comparison was carried out to contrast the most prominent security testing approaches available in the literature. These criteria will aid both practitioners and researchers to select appropriate approaches according to their needs. Additionally, it will provide researchers with guidance that could help them make a preliminary decision prior to their proposal of new security testing approaches.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Adinata, Putu Gio Satria, I. Putu Wira Pratama Putra, Ni Putu Adinda Indah Juliantari und Ketut Dita Ari Sutrisna. „Analisis Perbandingan Tools SQL Injection Menggunakan SQLmap, SQLsus dan The Mole“. Informatik : Jurnal Ilmu Komputer 18, Nr. 3 (28.12.2022): 286. http://dx.doi.org/10.52958/iftk.v18i3.5373.

Der volle Inhalt der Quelle
Annotation:
Penggunaan SQL injection merupakan sebuah ancaman yang sering terjadi di Internet. Karena penggunaan internet untuk berbagai layanan online meningkat, sama halnya dengan ancaman keamanan yang dimiliki web meningkat. Dikarenakan serangan injeksi SQL merupakan salah satu kerentanan keamanan yang paling serius dalam Web, Oleh karena itu penulis ingin membandingkan beberapa tools dari SQL Injection seperti SQLMap, SQLus, dan The Mole. Tools ini merupakan aplikasi dari sistem operasi Kali Linux, dalam aplikasi ini berguna dalam melakukan injeksi data – data yang ada pada suatu web khususnya database pada web dengan menggunakan fitur – fitur yang tersedia pada aplikasi ini. Dalam paper ini, kami telah menyajikan sebuah perbandingan penggunaan tools seperti SQLMap, SQLSus, dan The Mole dengan membandingkan 3 parameter seperti Cross Program, Functionality, Usability, perbandingan dimulai dari proses injeksi hingga aplikasi itu bekerja sampai dengan proses kita bisa mendapatkan database dari sebuah web yang sudah terinjeksi dan tanpa diketahui oleh korban.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Lee, Eunji. „Taming Performance Variability of Healthcare Data Service Frameworks with Proactive and Coarse-Grained Memory Cleaning“. International Journal of Environmental Research and Public Health 16, Nr. 17 (26.08.2019): 3096. http://dx.doi.org/10.3390/ijerph16173096.

Der volle Inhalt der Quelle
Annotation:
This article explores the performance optimizations of an embedded database memory management system to ensure high responsiveness of real-time healthcare data frameworks. SQLite is a popular embedded database engine extensively used in medical and healthcare data storage systems. However, SQLite is essentially built around lightweight applications in mobile devices, and it significantly deteriorates when a large transaction is issued such as high resolution medical images or massive health dataset, which is unlikely to occur in embedded systems but is quite common in other systems. Such transactions do not fit in the in-memory buffer of SQLite, and SQLite enforces memory reclamation as they are processed. The problem is that the current SQLite buffer management scheme does not effectively manage these cases, and the naïve reclamation scheme used significantly increases the user-perceived latency. Motivated by this limitation, this paper identifies the causes of high latency during processing of a large transaction, and overcomes the limitation via proactive and coarse-grained memory cleaning in SQLite.The proposed memory reclamation scheme was implemented in SQLite 3.29, and measurement studies with a prototype implementation demonstrated that the SQLite operation latency decreases by 13% on an average and up to 17.3% with our memory reclamation scheme as compared to that of the original version.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Dharmalingam, Jeya Mala, und M. Eswaran. „An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks“. International Journal of Intelligent Information Technologies 14, Nr. 3 (Juli 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.

Der volle Inhalt der Quelle
Annotation:
This article describes how software vulnerability analysis and testing for web applications should detect not only the common attacks but also dynamic vulnerability attacks. These are the attacks such as structured query language injection attacks (SQLIAs) which will extract the most crucial user information from the targeted database. In this proposed approach, an intelligent agent namely intelligent vulnerability analyzer agent (IVA) is proposed in which the external attacks due to dynamic user inputs are identified using a heuristic-guided intelligent graph searching and then a pre and post condition based analysis is performed to identify the dynamic vulnerabilities. Further, the proposed approach is compared with some of the existing works based on the number of false positives and false negatives of attacks detection and confirmed that the proposed work is a novel and effective one in finding out SQLIAs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Nidhal, Fyrooz, Hiba Naser R N, Nahida Abdul Latheef, Shahsitha Siddique V, Yomna Kalam A V und Neethu Prabhakaran P. „SQLIAD – A Hazard to Web Applications“. International Journal of Computer Trends and Technology 29, Nr. 1 (25.11.2015): 15–18. http://dx.doi.org/10.14445/22312803/ijctt-v29p103.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Wang, Yongzhi, Yulong Shen, Cuicui Su, Jiawen Ma, Lingtong Liu und Xuewen Dong. „CryptSQLite: SQLite With High Data Security“. IEEE Transactions on Computers 69, Nr. 5 (01.05.2020): 666–78. http://dx.doi.org/10.1109/tc.2019.2963303.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Winslett, Marianne, und Vanessa Braganholo. „Richard Hipp Speaks Out on SQLite“. ACM SIGMOD Record 48, Nr. 2 (19.12.2019): 39–46. http://dx.doi.org/10.1145/3377330.3377338.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Li, Jian Wei, Hong Guo und Yu Bin Xu. „Research on Optimization of SQLite Indexing Mechanism Based on Red-Black Tree“. Applied Mechanics and Materials 220-223 (November 2012): 2711–15. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2711.

Der volle Inhalt der Quelle
Annotation:
SQLite has been widely applied in embedded system because of its open source and less resource consumption. A novel optimization method with Red-black tree replacing B tree in indexing mechanism in order to solve the low efficiency and large energy consumption problem when inserting and deleting data in SQLite database was proposed in the paper. The contrast test of efficiency of between red-black tree and B tree while inserting and deleting data shows that this method can effectively improve the SQLite insertion and deletion operation efficiency and reduce the energy consumption.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Sebastian, Anu, Richa Kuriakose und Surekha Mariam Varghese. „NEO4J, SQLITE and MYSQL for Hospital Localization“. Advanced Computing: An International Journal 7, Nr. 3 (30.05.2016): 29–36. http://dx.doi.org/10.5121/acij.2016.7303.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Nemetz, Sebastian, Sven Schmitt und Felix Freiling. „A standardized corpus for SQLite database forensics“. Digital Investigation 24 (März 2018): S121—S130. http://dx.doi.org/10.1016/j.diin.2018.01.015.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Zhang, Li, Shengang Hao und Quanxin Zhang. „Recovering SQLite data from fragmented flash pages“. Annals of Telecommunications 74, Nr. 7-8 (20.02.2019): 451–60. http://dx.doi.org/10.1007/s12243-019-00707-9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Liu, Jun Lin, und Qi Yuan Sun. „Information Processing Based on SQLite for Target Tracking System“. Applied Mechanics and Materials 278-280 (Januar 2013): 2065–68. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.2065.

Der volle Inhalt der Quelle
Annotation:
As for the digital visual surveillance system, the traditional database and hardware platform can not be good at processing vast quantities of information. Combined with ActiveX Data Objects (ADO) technology, the information processing system was built by using SQLite database with embedded dual-core platform. The embedded database SQLite is implanted in the existing embedded hardware platform DM6446. And processing modules and operating interface were designed based on SQLite and the embedded hardware platform. The designed system can play a role as the core of data processing. The experiments show that the system can meet the requirements of the visual information processing such as data mining, online system analysis, data post-processing and so on.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Lashkaripour, Zeinab, und Abbas Ghaemi Bafghi. „A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs)“. International Journal of Security and Its Applications 7, Nr. 5 (30.09.2013): 53–66. http://dx.doi.org/10.14257/ijsia.2013.7.5.05.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Zhu, Alex, und Wei Qi Yan. „Exploring Defense of SQL Injection Attack in Penetration Testing“. International Journal of Digital Crime and Forensics 9, Nr. 4 (Oktober 2017): 62–71. http://dx.doi.org/10.4018/ijdcf.2017100106.

Der volle Inhalt der Quelle
Annotation:
SQLIA is adopted to attack websites with and without confidential information. Hackers utilized the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enlarging the scale of Distributed Denial of Service Attack (DDoS). The DDoS is that hackers maliciously turn down a website and make network resources unavailable to web users. It is extremely difficult to effectively detect and prevent SQLIA because hackers adopt various evading SQLIA Intrusion Detection System techniques. Victims may not be even aware of that their confidential data has been compromised for a long time. In this paper, our contribution is that we evaluate several most popular open source SQLIA tools and SQLIA prevention tools with both qualitative and quantitative assessments.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Datsko, Oleh, und Elżbieta Miłosz. „Performance comparison between Xamarin and Java database operations“. Journal of Computer Sciences Institute 7 (30.09.2018): 168–71. http://dx.doi.org/10.35784/jcsi.672.

Der volle Inhalt der Quelle
Annotation:
Work with database is one of base things in developing an application. Every technology/language uses own ways to work with database. In the case of Android the SQLite relational database management system is used. Analysis applies the read, write and delete of items from the table. SQLite is like a minimized version of desktop database management system so for every experiment very limited elements count is used.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Kar, Debabrata, Suvasini Panigrahi und Srikanth Sundararajan. „SQLiDDS: SQL injection detection using document similarity measure“. Journal of Computer Security 24, Nr. 4 (16.08.2016): 507–39. http://dx.doi.org/10.3233/jcs-160554.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Nana Mbinkeu, Rodrigue Carlos, und Bernabé Batchakui. „Reducing Disk Storage with SQLite into BitCoin Architecture“. International Journal of Recent Contributions from Engineering, Science & IT (iJES) 3, Nr. 2 (12.05.2015): 10. http://dx.doi.org/10.3991/ijes.v3i2.4490.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Bharadwaj, Y. V. Sai, Sai Bhageerath Yarrapatruni und Dr Prasada Rao YVSSSV. „SQLite Database and its Application on Embedded Platform“. International Journal of Computer Trends and Technology 67, Nr. 2 (25.02.2019): 1–6. http://dx.doi.org/10.14445/22312803/ijctt-v67i2p101.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Park, Jong-Hyeok, Gihwan Oh und Sang-Won Lee. „SQL statement logging for making SQLite truly lite“. Proceedings of the VLDB Endowment 11, Nr. 4 (Dezember 2017): 513–25. http://dx.doi.org/10.1145/3186728.3164146.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Winasis, Persis Haryo, Raga Maulana und Yodi Susanto. „Designing Application For Defect Recording and Handover Of Property Based On Mobile Application by Applying SQLite Technology“. CCIT Journal 13, Nr. 2 (27.08.2020): 185–95. http://dx.doi.org/10.33050/ccit.v13i2.990.

Der volle Inhalt der Quelle
Annotation:
Property development companies that produce housing products, high rise dwellings, and office buildings generally have data on the quality of buildings, one of which is obtained during the defect inspection process between developers and consumers before handing over units. Recording data is generally still done manually using a form on a paper. For these conditions, researchers tried to build an application based on mobile apps to digitally record the defect checklist of the dwelling so that the data collected can be processed for the needs of analysis and development strategies. Difficulties encountered during the unit handover process using digital methods on the newly completed property, one of which is the quality of data and internet signals. Mobile apps certainly require a data signal connection to send data to the server. This Android-based mobile apps will implement SQLite technology which allows the recording of transactions to be done locally first, which can then be synchronized into the database server after getting the required internet data connection. SQLite was chosen because it has a relatively small library code unlike relational DBMS in general. SQLite is also easy to use without complex configurations. With the support of the ease of function of SQLite it also allows applications to be integrated with the property sales application system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Shin, Jiho, und Jung-Taek Seo. „Verification of Privacy Protection Reliability through Mobile Forensic Approach Regarding iOS-Based Instant Messenger“. Sustainability 14, Nr. 20 (15.10.2022): 13281. http://dx.doi.org/10.3390/su142013281.

Der volle Inhalt der Quelle
Annotation:
With the diffusion of mobile devices and Internet hyperconnectivity technology, all daily living records of individuals are being recorded on mobile devices in real time. However, from the user’s point of view, the reliability of privacy protection, that is, whether the user’s data on the mobile device completely disappears when it is deleted, is critical. This is because, for the sustainability of social growth, it is necessary to control the digitalization and technology that heightens the risks of the future society. Therefore, this study aims to check the traces of the SQLite database to see if instant messenger messages deleted by the user can be recovered. When the SQLite database record is deleted, if the database shrink function or other application-level deletion does not work, it is possible to recover the deleted record. We chose two iOS-based instant messengers, WhatsApp and WeChat, and analyzed the SQLite DB file and Table Schema where messages are stored. As a result of the experiment in this study, it was verified that the area where the deleted message was stored in the SQLite DB file was overwritten with 0 × 00 or updated with a NULL value, making it impossible to recover the deleted message. This process operates at the app level, and user data is safely protected.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

HARIANI, HARIANI. „EKSPLORASI WEB BROWSER DALAM PENCARIAN BUKTI DIGITAL MENGGUNAKAN SQLITE“. Jurnal INSTEK (Informatika Sains dan Teknologi) 6, Nr. 1 (06.01.2021): 66. http://dx.doi.org/10.24252/instek.v6i1.18638.

Der volle Inhalt der Quelle
Annotation:
Penggunaan Internet yang meningkat membuat semakin maraknya pengguna web browser. Hal ini bisa memberikan dampak pada meningkatnya kejahatan dunia maya menggunakan media tersebut misalnya menyebarkan hoax, penipuan Email dan lain-lain. Penelitian ini bertujuan untuk mengetahui pentingnya melihat aktivitas pada web browser baik terhadap korban maupun pelaku. Hal ini bisa menentukan pola kejahatan pada suatu kasus dan membantu penyidik dalam menganalisis bukti digital yang tersimpan pada WEB Browser sehingga kasus bisa di selesaikan dengan baik dan tepat. Penelitian ini menunjukkan lokasi history pencarian pada cookie, cache, history download dan melihat password yang tersimpan di web browser safari, maxthon dan comodo dragon menggunakan SQLite. Hasil analisis menunjukkan bahwa banyak Informasi yang di peroleh dari bukti digital web browser menggunakan SQLite sehingga metode ini dapat di terapkan untuk mendapatkan bukti digital jika di perlukan sebagai pembuktian sebuah kasus.Kata kunci – Web Browser, SQLite, Bukti Digital
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Petráš, Václav. „Implementation of SQLite database support in program gama-local“. Geoinformatics FCE CTU 7 (29.12.2011): 73–84. http://dx.doi.org/10.14311/gi.7.6.

Der volle Inhalt der Quelle
Annotation:
The program gama-local is a part of GNU Gama project and allows adjustment of local geodetic networks. Before realization of this project the program gama-local supported only XML as an input. I designed and implemented support for the SQLite database and thanks to this extension gama-local can read input data from the SQLite database. This article is focused on the specifics of the use of callback functions in C++ using the native SQLite C/C++ Application Programming Interface. The article provides solution to safe calling of callback functions written in C++. Callback functions are called from C library and C library itself is used by C++ program. Provided solution combines several programing techniques which are described in detail, so this article can serve as a cookbook even for beginner programmers. This project was accomplished within my bachelor thesis.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Wang, Gang, und Ming Yu Zhao. „Study and Optimization of Database on Android Platform“. Applied Mechanics and Materials 263-266 (Dezember 2012): 1754–58. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1754.

Der volle Inhalt der Quelle
Annotation:
Due to the poor database performance situation on Android operating system, put forward a methods of database access performance optimization. The paper first analyze the Android database access principle, architecture of SQLite and Berkeley DB, and methods of Berkeley DB in concurrent access, then put forward a method of porting Berkeley DB to Android to replace SQLite to enhance the database access performance. Finally a series of practical benchmark results shows that the porting brings performance improvement effect.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Putra, Raden Bagus Dimas, Eko Setia Budi und Abdul Rahman Kadafi. „Perbandingan Antara SQLite, Room, dan RBDLiTe Dalam Pembuatan Basis Data pada Aplikasi Android“. JURIKOM (Jurnal Riset Komputer) 7, Nr. 3 (14.06.2020): 376. http://dx.doi.org/10.30865/jurikom.v7i3.2161.

Der volle Inhalt der Quelle
Annotation:
Android is one of the largest mobile operating system platforms today. Amid the ever-increasing needs of users, Android programmers are still lacking to meet the current market needs. One of the problems that causes this is the difficulty of creating an internal database, so many people give up to learn to make Android applications. Android's internal database is hard to create because the entire data structure on that database should be built with the query executed in the created program code. Some of the common internal databases currently used are SQLiTe and Room. Both databases are quite difficult to learn where SQLite should build everything from scratch while Room should study the structure and systematics of of the library. Therefore, in this article, the author proposes library and template named "Relational Database Library and Template" which will be referred to as RBDLiTe which can create an internal database for Android applications easily which will also be compared with SQLiTe and Room in its use.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Feng, Xing Li, Zhi Hai Suo, Yao Tang Wei und Mo Xu. „The Financial Management System Based on Android and SQLite“. Applied Mechanics and Materials 462-463 (November 2013): 974–77. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.974.

Der volle Inhalt der Quelle
Annotation:
SQLite is a lightweight database which is widely used in most of embedded devices becauseof its advantages such as open source, zero configuration, self-contained, server less, highly concurrent, etc. The Android application in this paper uses SQLiteOpenHelper to initialize the database and store many kinds of data types such as text, date, time, image into database. GalleryAdapter extended from BaseAdapter is used to write the image taken by camera and stored in SD card into the database table. The design of user interface is aesthetic and convenient. The user experience is favorable. It is a good choice for family financial management.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Imam Farisi, Mukhaimy Gazali und Rudy Anshari. „SQLite Sebagai Pengganti Lucene.Net pada Pencarian Produk Toko Online“. Jurnal CoSciTech (Computer Science and Information Technology) 1, Nr. 2 (31.10.2020): 36–43. http://dx.doi.org/10.37859/coscitech.v1i2.2204.

Der volle Inhalt der Quelle
Annotation:
A business institution can promote their products in its online shop. With the promotion of online stores, consumers can find out which products are sold at the store. Consumers who are looking for a product can search based on various attributes of goods that are scattered in various fields in the database table, and can even be spread across different tables. All attributes that point to an item are collected in one document which will be searched using the Full Text Search system. Two alternatives to the Full Text Search system were selected; Lucene.Net and Sqlite Full Text Search. Before actually being used, these two search system alternatives were tested first. In document storage size, Lucene.Net is superior by 6.78 times. The speed of writing Sqlite search documents is superior by between 1,875 times to 5,197 times. In terms of key search speed, Lucene.Net was superior by between 1,169 and 1,698 times. Based on the consideration of the speed and development of Lucene.Net Core which is still in beta stage, Sqlite Full Text Search is suitable for use in the product search process in the Online Store.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Kabakuş, Abdullah Talha. „Pratik Açıdan SQLite ve Firebase Veritabanlarının Bir Performans Karşılaştırması“. Düzce Üniversitesi Bilim ve Teknoloji Dergisi 7, Nr. 1 (31.01.2019): 314–25. http://dx.doi.org/10.29130/dubited.441672.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Oh, Gihwan, Sangchul Kim, Sang-Won Lee und Bongki Moon. „SQLite optimization with phase change memory for mobile applications“. Proceedings of the VLDB Endowment 8, Nr. 12 (August 2015): 1454–65. http://dx.doi.org/10.14778/2824032.2824044.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Borovskoy, I. G., E. A. Shelmina und N. V. Zarikovskaya. „Text Data Storage Method Modification for SQLite Relational Database“. Journal of Physics: Conference Series 803 (Januar 2017): 012025. http://dx.doi.org/10.1088/1742-6596/803/1/012025.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Jeon, Sangjun, Jewan Bang, Keunduck Byun und Sangjin Lee. „A recovery method of deleted record for SQLite database“. Personal and Ubiquitous Computing 16, Nr. 6 (24.07.2011): 707–15. http://dx.doi.org/10.1007/s00779-011-0428-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Choi, Jin-oh. „Implementation and Experiment for Search Performance Analysis of SQLite Mobile Database“. Journal of the Korea Institute of Information and Communication Engineering 21, Nr. 2 (28.02.2017): 333–38. http://dx.doi.org/10.6109/jkiice.2017.21.2.333.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Abogaa, Jennifer Bagulaya. „e-recognition of Motorbike License Plate using Python and SQLite“. Indian Journal Of Science And Technology 15, Nr. 48 (27.12.2022): 2757–64. http://dx.doi.org/10.17485/ijst/v15i48.1673.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Zhou, Bing. „Analysis of the Security Mechanism of Android and Countermeasures“. Applied Mechanics and Materials 687-691 (November 2014): 2948–51. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2948.

Der volle Inhalt der Quelle
Annotation:
Now, as the security threats for the Android phone increasing, the security problem about the smart mobile-phone has become a focus of the topic. In this paper, we take the security problems on Android operating system as the study object .Our contribution in this paper is two-fold. First, SQLite database is the mainly way for data storage on Android, but no security mechanism was provided in SQLite, we implement data encryption technique refer to the common database security mechanism. Second, in order to solve the security threats existing in the traditional phone, we also give a design and implementation of multi-function mobile phone firewall.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Qin, Lu, Jeffrey Xu Yu und Lijun Chang. „Ten thousand SQLs“. Proceedings of the VLDB Endowment 3, Nr. 1-2 (September 2010): 58–69. http://dx.doi.org/10.14778/1920841.1920854.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Bhagat, Siddhesh, R. R. Sedamkar und Prachi Janrao. „Preventing SQLIA using ORM Tool with HQL“. International Journal of Applied Information Systems 11, Nr. 4 (06.09.2016): 44–47. http://dx.doi.org/10.5120/ijais2016451600.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Kumar, Pankaj, und C. P. Katti. „A Parallel-SQLIA Detector for Web Security“. International Journal of Information Engineering and Electronic Business 8, Nr. 2 (08.03.2016): 66–75. http://dx.doi.org/10.5815/ijieeb.2016.02.08.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Libkin, Leonid. „SQL’s Three-Valued Logic and Certain Answers“. ACM Transactions on Database Systems 41, Nr. 1 (07.04.2016): 1–28. http://dx.doi.org/10.1145/2877206.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Xie, Cong, und Shao Jian Song. „Design of Door Monitoring Interface Based on Qt4 and SQLite“. Applied Mechanics and Materials 556-562 (Mai 2014): 1592–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.1592.

Der volle Inhalt der Quelle
Annotation:
With the number of private cars increasing, the problems such as the shortage of parking spaces, the disorder and congestion of parking are becoming serious, especially in a flourishing business street. So we do the research based on an underground parking lot at a commercial district. In this paper, we design a monitoring interface based on embedded cross-platform GUI system-Qt4 and embedded SQLite combining RFID and Zigbee technology on computer, and then transplant it to Intel PXA270 based on ARM-Linux. The designed system can realize automatic identification, charging of vehicles and displaying parking spaces. It can improve the efficiency of parking.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Суворов, Александр Павлович, und Сергей Петрович Зоткин. „Применение программы DB Browser for SQLite для создания баз данных“. Естественные и Технические Науки, Nr. 09 (2020): 108–11. http://dx.doi.org/10.37882/2223-2966.2020.09.36.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Lokhande, Sharayu, und Vaishali Ganganwar. „Accessing and Modifying Sqlite Remotely for Catering Multi Client Access“. International Journal of Science and Engineering Applications 4, Nr. 6 (19.11.2015): 350–52. http://dx.doi.org/10.7753/ijsea0406.1003.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Yamamoto, Moriki, und Hisao Koizumi. „An Experimental Evaluation using SQLite for Real-Time Stream Processing“. Journal of International Council on Electrical Engineering 3, Nr. 1 (Januar 2013): 68–72. http://dx.doi.org/10.5370/jicee.2013.3.1.068.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Rigin, A. M., und S. A. Shershakov. „SQLite RDBMS Extension for Data Indexing Using B-tree Modifications“. Proceedings of the Institute for System Programming of the RAS 31, Nr. 3 (2019): 203–16. http://dx.doi.org/10.15514/ispras-2019-31(3)-16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Khwaldeh, Ali, Amani Tahat, Jordi Marti und Mofleh Tahat. „Atomic Data Mining Numerical Methods, Source Code SQlite with Python“. Procedia - Social and Behavioral Sciences 73 (Februar 2013): 232–39. http://dx.doi.org/10.1016/j.sbspro.2013.02.046.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Liu, Chen Chen. „Research of Embedded Image Processing Based on ARM11 and SQLite“. Applied Mechanics and Materials 373-375 (August 2013): 1603–6. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1603.

Der volle Inhalt der Quelle
Annotation:
According to the fact that the embedded system is not efficient enough to access and manipulate image data, this paper put forward a research program of image JPEG compression algorithm and being stored in a combination based on the ARM11 and SQLite embedded database image processing system. Comparative Researches on the system without data prove that the program can make the embedded systems more reasonable to store image data and realize the localized efficient management of the image data, which has certain practical value.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie