Academic literature on the topic 'Sql-injection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sql-injection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Sql-injection"
Bisson, R. "SQL injection." ITNOW 47, no. 2 (2005): 25. http://dx.doi.org/10.1093/itnow/bwi039.
Full textShar, Lwin Khin, and Hee Beng Kuan Tan. "Defeating SQL Injection." Computer 46, no. 3 (2013): 69–77. http://dx.doi.org/10.1109/mc.2012.283.
Full textWrightes, Jene. "SQL injection attacks." Advances in Engineering Innovation 2, no. 1 (2023): 26–31. http://dx.doi.org/10.54254/2977-3903/2/2023017.
Full textNagpal, Bharti, Naresh Chauhan, and Nanhay Singh. "A Viable Solution to Prevent SQL Injection Attack Using SQL Injection." i-manager's Journal on Computer Science 3, no. 3 (2015): 5–10. http://dx.doi.org/10.26634/jcom.3.3.3660.
Full textMr., Vishal Andodariya. "SQL Injection Attack Detection and Prevention Techniques to Secure Web Site." International Journal of Trend in Scientific Research and Development 2, no. 4 (2019): 624–28. https://doi.org/10.31142/ijtsrd13034.
Full textKusuma, Gregorius Hendy. "Analysis of SQL Injection Attacks on Website Service." bit-Tech 1, no. 1 (2018): 26–33. http://dx.doi.org/10.32877/bt.v1i1.3.
Full textMohd Yunus, Mohd Amin, Muhammad Zainulariff Brohan, Nazri Mohd Nawi, Ely Salwana Mat Surin, Nurhakimah Azwani Md Najib, and Chan Wei Liang. "Review of SQL Injection : Problems and Prevention." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (2018): 215. http://dx.doi.org/10.30630/joiv.2.3-2.144.
Full textDalai, Asish Kumar, and Sanjay Kumar Jena. "Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3825373.
Full textShalawati, Wa Ode Hardianas, Muh. Yamin, and Natalis Ransi. "IMPLEMENTASI TEKNOLOGI ENKRIPSI URL (UNIFORM RESOURCE LOCATOR) DAN LOGIN FORM MENGGUNAKAN ALGORITMA BLOWFISH UNTUK MENCEGAH SERANGAN SQL INJECTION." semanTIK 5, no. 2 (2019): 273–82. https://doi.org/10.5281/zenodo.3510178.
Full textJANG, Young-Su. "Detection of SQL Injection Vulnerability in Embedded SQL." IEICE Transactions on Information and Systems E103.D, no. 5 (2020): 1173–76. http://dx.doi.org/10.1587/transinf.2019edl8143.
Full textDissertations / Theses on the topic "Sql-injection"
Aryal, Dhiraj, and Anup Shakya. "A Taxonomy of SQL Injection Defense Techniques." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3076.
Full textBahureková, Beáta. "Technika SQL injection - její metody a způsoby ochrany." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-433304.
Full textCetin, Cagri. "Authentication and SQL-Injection Prevention Techniques in Web Applications." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7766.
Full textSjöström, Linus. "Detecting SQL Injection Attacks in VoIP using Real-time Deep Packet Inspection : Can a Deep Packet Inspection Firewall Detect SQL Injection Attacks on SIP Traffic with Reasonable Performance?" Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161072.
Full textTrumble, Brandon. "Using Code Inspection, Code Modification, and Machine Learning to prevent SQL Injection." Thesis, Kutztown University of Pennsylvania, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1590429.
Full textUwagbole, Solomon. "A pattern-driven corpus to predictive analytics in mitigating SQL injection attack." Thesis, Edinburgh Napier University, 2018. http://researchrepository.napier.ac.uk/Output/1538260.
Full textGopali, Gopali. "Protecting Web Applications from SQL Injection Attacks- Guidelines for Programmers Master Thesis." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20238.
Full textPandey, Amit Kumar. "Securing Web Applications From Application-Level Attack." Kent State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=kent1181098075.
Full textNorström, Alexander. "Measuring Accurancy of Vulnerability Scanners : An Evaluation with SQL Injections." Thesis, Linköpings universitet, Informationskodning, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-106628.
Full textScholte, Theodoor. "Amélioration de la sécurité par la conception des logiciels web." Thesis, Paris, ENST, 2012. http://www.theses.fr/2012ENST0024/document.
Full textBooks on the topic "Sql-injection"
Gupta, Sunil. SQL Injection Attacks. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6505-5.
Full textWassermann, Tobias. Sichere Webanwendungen mit PHP: [Sicherheit mit PHP, MySQL, Apache, JavaScript, AJAX ; sichere Sessions und Uploads, Lösungen gegen SQL-Injection und Cross-Site Scripting ; Umgang mit sensitiven Daten, Verschlüsselung und Authentifizierung mit SSL]. Mitp, 2007.
Find full textSQL Injection Attacks and Defense. Elsevier, 2009. http://dx.doi.org/10.1016/b978-1-59749-424-3.x0001-1.
Full textClarke, Justin. SQL Injection Attacks and Defense. Elsevier Science & Technology Books, 2009.
Find full textTeckchandani, Tanmay. SQL Injection Attacks and Mitigations. GRIN Verlag GmbH, 2019.
Find full textBook chapters on the topic "Sql-injection"
Adams, Ralf. "SQL Injection." In SQL, 4th ed. Carl Hanser Verlag GmbH & Co. KG, 2021. http://dx.doi.org/10.3139/9783446472204.025.
Full textCarter, Peter A. "SQL Injection." In Securing SQL Server. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4161-5_10.
Full textSnyder, Chris, Thomas Myer, and Michael Southwell. "Preventing SQL Injection." In Pro PHP Security. Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3319-0_3.
Full textOrso, Alessandro. "SQL Injection Attacks." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_662.
Full textOrso, Alessandro. "SQL Injection Attacks." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_662.
Full textPollack, Edward. "Protecting Against SQL Injection." In Dynamic SQL. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1811-2_2.
Full textPollack, Edward. "Protecting Against SQL Injection." In Dynamic SQL. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4318-3_2.
Full textBoyd, Stephen W., and Angelos D. Keromytis. "SQLrand: Preventing SQL Injection Attacks." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24852-1_21.
Full textAhuja, Bharat Kumar, Angshuman Jana, Ankit Swarnkar, and Raju Halder. "On Preventing SQL Injection Attacks." In Advances in Intelligent Systems and Computing. Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2650-5_4.
Full textSinha, Sanjib. "Finding HTML and SQL Injection Vulnerabilities." In Bug Bounty Hunting for Web Security. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5391-5_10.
Full textConference papers on the topic "Sql-injection"
Harve, Bindu Mohan, Manjunatha Sughaturu Krishnappa, Vivekananda Jayaram, et al. "Mitigating SQL Injection Vulnerabilities with Oracle 23c SQL Firewall." In 2024 First International Conference on Data, Computation and Communication (ICDCC). IEEE, 2024. https://doi.org/10.1109/icdcc62744.2024.10961621.
Full textV, Sathya, Anirutth SA, and Mohamed Safresh H. "Survey on Prevention of SQL Injection." In 2024 International Conference on Smart Technologies for Sustainable Development Goals (ICSTSDG). IEEE, 2024. https://doi.org/10.1109/icstsdg61998.2024.11026349.
Full textT, Subbulakshmi, Josiga S, Brindha S, Jishnu S, and Adityan Sunil Kumar. "SQL Injection Testing on Website using Sqlmap." In 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies (TQCEBT). IEEE, 2024. http://dx.doi.org/10.1109/tqcebt59414.2024.10545289.
Full textVoitovych, O. P., O. S. Yuvkovetskyi, and L. M. Kupershtein. "SQL injection prevention system." In 2016 International Conference "Radio Electronics & Info Communications" (UkrMiCo). IEEE, 2016. http://dx.doi.org/10.1109/ukrmico.2016.7739642.
Full textAlsobhi, Hanan, and Reem Alshareef. "SQL Injection Countermeasures Methods." In 2020 International Conference on Computing and Information Technology (ICCIT-1441). IEEE, 2020. http://dx.doi.org/10.1109/iccit-144147971.2020.9213748.
Full textCetin, Cagri, Dmitry Goldgof, and Jay Ligatti. "SQL-Identifier Injection Attacks." In 2019 IEEE Conference on Communications and Network Security (CNS). IEEE, 2019. http://dx.doi.org/10.1109/cns.2019.8802743.
Full textSadeghian, Amirmohammad, Mazdak Zamani, and Suhaimi Ibrahim. "SQL Injection Is Still Alive: A Study on SQL Injection Signature Evasion Techniques." In 2013 International Conference on Informatics and Creative Multimedia (ICICM). IEEE, 2013. http://dx.doi.org/10.1109/icicm.2013.52.
Full textRai, Aditya, MD Mazharul Islam Miraz, Deshbandhu Das, Harpreet Kaur, and Swati. "SQL Injection: Classification and Prevention." In 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM). IEEE, 2021. http://dx.doi.org/10.1109/iciem51511.2021.9445347.
Full textKaur, Pankajdeep, and Kanwal Preet Kour. "SQL injection: Study and augmentation." In 2015 International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, 2015. http://dx.doi.org/10.1109/ispcc.2015.7375006.
Full textPriyaa, B. Deva, and M. Indra Devi. "Hybrid SQL injection detection system." In 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS ). IEEE, 2016. http://dx.doi.org/10.1109/icaccs.2016.7586332.
Full textReports on the topic "Sql-injection"
Orso, Alessandro, Wenke Lee, and Adam Shostack. Preventing SQL Code Injection by Combining Static and Runtime Analysis. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada482932.
Full textBri Rolston. Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems. Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/911631.
Full text