Dissertations / Theses on the topic 'SQL injection attack detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 23 dissertations / theses for your research on the topic 'SQL injection attack detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bahureková, Beáta. "Technika SQL injection - její metody a způsoby ochrany." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-433304.
Full textWhitelaw, Clayton. "Precise Detection of Injection Attacks on Concrete Systems." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/6051.
Full textPandey, Amit Kumar. "Securing Web Applications From Application-Level Attack." Kent State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=kent1181098075.
Full textUwagbole, Solomon. "A pattern-driven corpus to predictive analytics in mitigating SQL injection attack." Thesis, Edinburgh Napier University, 2018. http://researchrepository.napier.ac.uk/Output/1538260.
Full textSjöström, Linus. "Detecting SQL Injection Attacks in VoIP using Real-time Deep Packet Inspection : Can a Deep Packet Inspection Firewall Detect SQL Injection Attacks on SIP Traffic with Reasonable Performance?" Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161072.
Full textGopali, Gopali. "Protecting Web Applications from SQL Injection Attacks- Guidelines for Programmers Master Thesis." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20238.
Full textDeshpande, Chinmay Ravindra. "Hardware Fault Attack Detection Methods for Secure Embedded Systems." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/82141.
Full textNsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Full textAndersson, Stig. "Detecting and characterising malicious executable payloads." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/30325/1/Stig_Andersson_Thesis.pdf.
Full textAndersson, Stig. "Detecting and characterising malicious executable payloads." Queensland University of Technology, 2009. http://eprints.qut.edu.au/30325/.
Full textMakiou, Abdelhamid. "Sécurité des applications Web : Analyse, modélisation et détection des attaques par apprentissage automatique." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0084.
Full textMakiou, Abdelhamid. "Sécurité des applications Web : Analyse, modélisation et détection des attaques par apprentissage automatique." Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0084/document.
Full textJégrová, Eliška. "Detekce útoků cílených na webové aplikace." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-376961.
Full textNemanja, Živković. "Detekcija malicioznih napada na elektroenergetski sistem korišćenjem sinergije statičkog i dinamičkog estimatora stanja." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2019. https://www.cris.uns.ac.rs/record.jsf?recordId=108186&source=NDLTD&language=en.
Full textLu, Chian-Huey, and 盧芊慧. "Web Platform Independent SQL injection Attack Generation." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/43099096080587428778.
Full textChia, Bernard, and 謝孟峰. "Web Forensic: Evidence of SQL Injection Attack Analysis." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/81060912022228427261.
Full textWu, Ching-Ju, and 吳靜茹. "A Defense against SQL Injection Attack through Validation on Input Legitimacy." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/44317375982863901114.
Full textLee, An-Na, and 李安娜. "A Defense against Compositional SQL Injection Attack through Validation on Input Legitimacy." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/97401110032725711181.
Full textAntunes, João Alexandre Simões. "Vulnerability assessment through attack injection." Master's thesis, 2006. http://hdl.handle.net/10451/13991.
Full textChen, Wei-Lin, and 陳威霖. "A Defense against Stored Procedure Compositional SQL Injection Attack through Validation on Input Legitimacy." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/26361252040531115602.
Full textHuang, Cong-Ren, and 黃琮仁. "The Study of Black-box SQL Injection Security Detection Mechanisms Based on Machine Learning." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/7thwhz.
Full text"Reliability Enhancements for Real-Time Operations of Electric Power Systems." Doctoral diss., 2017. http://hdl.handle.net/2286/R.I.46341.
Full textRaposo, Duarte Miguel Garcia. "Monitoring Industrial Wireless Sensor Networks: A model to enhance Security and Reliability." Doctoral thesis, 2020. http://hdl.handle.net/10316/88841.
Full text