Academic literature on the topic 'SQL-Injection attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SQL-Injection attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SQL-Injection attacks"
Nugroho, Aldebaran Bayu, and Satria Mandala. "Study the Best PenTest Algorithm for Blind SQL Injection Attacks." International Journal on Information and Communication Technology (IJoICT) 5, no. 2 (June 10, 2020): 1. http://dx.doi.org/10.21108/ijoict.2019.52.268.
Full textEt. al., Leelavathy S,. "A Secure Methodology to Detect and Prevent Ddos and Sql Injection Attacks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 341–46. http://dx.doi.org/10.17762/turcomat.v12i2.722.
Full textN, Asha, M. Varun Kumar, and Vaidhyanathan G. Vaidhyanathan.G. "Preventing SQL Injection Attacks." International Journal of Computer Applications 52, no. 13 (August 30, 2012): 28–32. http://dx.doi.org/10.5120/8264-1809.
Full textSilva, Rui Filipe, Raul Barbosa, and Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Full textDalai, Asish Kumar, and Sanjay Kumar Jena. "Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3825373.
Full textKusuma, Gregorius Hendy. "Analysis of SQL Injection Attacks on Website Service." bit-Tech 1, no. 1 (September 18, 2018): 26–33. http://dx.doi.org/10.32877/bt.v1i1.3.
Full textMahrouqi, A., P. Tobin, S. Abdalla, and T. Kechadi. "Simulating SQL-Injection Cyber-Attacks Using GNS3." International Journal of Computer Theory and Engineering 8, no. 3 (June 2016): 213–17. http://dx.doi.org/10.7763/ijcte.2016.v8.1046.
Full textDharam, Ramya, and Sajjan G. Shiva. "Runtime Monitoring Framework for SQL Injection Attacks." International Journal of Engineering and Technology 6, no. 5 (2014): 392–401. http://dx.doi.org/10.7763/ijet.2014.v6.731.
Full textAbdulmalik, Yazeed. "An Improved SQL Injection Attack Detection Model Using Machine Learning Techniques." International Journal of Innovative Computing 11, no. 1 (April 28, 2021): 53–57. http://dx.doi.org/10.11113/ijic.v11n1.300.
Full textJ. Santhosh Kumar, B., and P. P. Anaswara. "Vulnerability detection and prevention of SQL injection." International Journal of Engineering & Technology 7, no. 2.31 (May 29, 2018): 16. http://dx.doi.org/10.14419/ijet.v7i2.31.13388.
Full textDissertations / Theses on the topic "SQL-Injection attacks"
Gopali, Gopali. "Protecting Web Applications from SQL Injection Attacks- Guidelines for Programmers Master Thesis." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20238.
Full textInjection attack is the most critical web application security risk, and SQL-injection (SQLi) attack is the most reported injection attack on web applications. In this thesis, we have identified the attacking techniques used by attackers and we are also providing guidelines so that the programmers can write web application code in a secure way, to prevent the SQLi attacks.The methodology applied for the research is literature study and we used the way proof by demonstration to get the clear picture. The first step was to find out the coding flaws, then we designed guidelines that can help to protect web applications from SQLi attacks. This thesis will help the programmers to understand the various coding flaws and how those coding flaws can be prevented and for this, we have used proof by demonstration. This thesis will also contribute to the general awareness of SQLi attacks, attack types and guidelines for the programmers who are designing, developing and testing web applications.
Sjöström, Linus. "Detecting SQL Injection Attacks in VoIP using Real-time Deep Packet Inspection : Can a Deep Packet Inspection Firewall Detect SQL Injection Attacks on SIP Traffic with Reasonable Performance?" Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161072.
Full textCetin, Cagri. "Authentication and SQL-Injection Prevention Techniques in Web Applications." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7766.
Full textSmith, Grant Joseph. "Analysis and Prevention of Code-Injection Attacks on Android OS." Scholar Commons, 2014. https://scholarcommons.usf.edu/etd/5391.
Full textNsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Full textWheeler, Ryan. "BlindCanSeeQL: Improved Blind SQL Injection For DB Schema Discovery Using A Predictive Dictionary From Web Scraped Word Based Lists." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/6050.
Full textWhitelaw, Clayton. "Precise Detection of Injection Attacks on Concrete Systems." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/6051.
Full textBahureková, Beáta. "Technika SQL injection - její metody a způsoby ochrany." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-433304.
Full textPandey, Amit Kumar. "Securing Web Applications From Application-Level Attack." Kent State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=kent1181098075.
Full textUwagbole, Solomon. "A pattern-driven corpus to predictive analytics in mitigating SQL injection attack." Thesis, Edinburgh Napier University, 2018. http://researchrepository.napier.ac.uk/Output/1538260.
Full textBooks on the topic "SQL-Injection attacks"
Gupta, Sunil. SQL Injection Attacks. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6505-5.
Full textSQL Injection Attacks and Defense. Elsevier, 2009. http://dx.doi.org/10.1016/b978-1-59749-424-3.x0001-1.
Full textGalluccio, Ettore, Edoardo Caselli, and Gabriele Lombari. SQL Injection Strategies: Practical Techniques to Secure Old Vulnerabilities Against Modern Attacks. Packt Publishing, Limited, 2020.
Find full textBook chapters on the topic "SQL-Injection attacks"
Orso, Alessandro. "SQL Injection Attacks." In Encyclopedia of Cryptography and Security, 1251–52. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_662.
Full textAhuja, Bharat Kumar, Angshuman Jana, Ankit Swarnkar, and Raju Halder. "On Preventing SQL Injection Attacks." In Advances in Intelligent Systems and Computing, 49–64. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2650-5_4.
Full textBoyd, Stephen W., and Angelos D. Keromytis. "SQLrand: Preventing SQL Injection Attacks." In Applied Cryptography and Network Security, 292–302. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24852-1_21.
Full textGeneiatakis, Dimitris. "Minimizing Databases Attack Surface Against SQL Injection Attacks." In Information and Communications Security, 1–9. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29814-6_1.
Full textChoraś, Michał, Rafał Kozik, Damian Puchalski, and Witold Hołubowicz. "Correlation Approach for SQL Injection Attacks Detection." In Advances in Intelligent Systems and Computing, 177–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-33018-6_18.
Full textMann, Abhijot Singh, and Sheela Jain. "Efficiently-Enabled Inclusive Approach Preventing SQL Injection Attacks." In Computer Networks and Information Technologies, 421–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19542-6_79.
Full textArumugam, Chamundeswari, Varsha Bhargavi Dwarakanathan, S. Gnanamary, Vishalraj Natarajan Neyveli, Rohit Kanakuppaliyalil Ramesh, Yeshwanthraa Kandhavel, and Sadhanandhan Balakrishnan. "Prediction of SQL Injection Attacks in Web Applications." In Computational Science and Its Applications – ICCSA 2019, 496–505. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24305-0_37.
Full textKhanna, Surya, and A. K. Verma. "Classification of SQL Injection Attacks Using Fuzzy Tainting." In Advances in Intelligent Systems and Computing, 463–69. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3373-5_46.
Full textAziz, Benjamin, Mohamed Bader, and Cerana Hippolyte. "Search-Based SQL Injection Attacks Testing Using Genetic Programming." In Lecture Notes in Computer Science, 183–98. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30668-1_12.
Full textWu, Tsu-Yang, Jeng-Shyang Pan, Chien-Ming Chen, and Chun-Wei Lin. "Towards SQL Injection Attacks Detection Mechanism Using Parse Tree." In Advances in Intelligent Systems and Computing, 371–80. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-12286-1_38.
Full textConference papers on the topic "SQL-Injection attacks"
Cetin, Cagri, Dmitry Goldgof, and Jay Ligatti. "SQL-Identifier Injection Attacks." In 2019 IEEE Conference on Communications and Network Security (CNS). IEEE, 2019. http://dx.doi.org/10.1109/cns.2019.8802743.
Full textVentura, Ruben. "Blind SQL Injection Attacks Optimization." In 9th International Conference on Signal, Image Processing and Pattern Recognition (SPPR 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101909.
Full textWang, Jie, Raphael C. W. Phan, John N. Whitley, and David J. Parish. "Augmented attack tree modeling of SQL injection attacks." In 2010 2nd IEEE International Conference on Information Management and Engineering. IEEE, 2010. http://dx.doi.org/10.1109/icime.2010.5478321.
Full textHalfond, William G. J., and Alessandro Orso. "Preventing SQL injection attacks using AMNESIA." In Proceeding of the 28th international conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1134285.1134416.
Full textRauti, Sampsa, Jukka Teuhola, and Ville Leppanen. "Diversifying SQL to Prevent Injection Attacks." In 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.393.
Full textYang Bing and Wang Xin. "Multi-level preventing SQL injection attacks." In 2013 IEEE Conference Anthology. IEEE, 2013. http://dx.doi.org/10.1109/anthology.2013.6784808.
Full textSilva, Rui, Raul Barbosa, and Jorge Bernardino. "Testing Snort with SQL Injection Attacks." In the Ninth International C* Conference. New York, New York, USA: ACM Press, 2016. http://dx.doi.org/10.1145/2948992.2949001.
Full textSadeghian, Amirmohammad, Mazdak Zamani, and Shahidan M. Abdullah. "A Taxonomy of SQL Injection Attacks." In 2013 International Conference on Informatics and Creative Multimedia (ICICM). IEEE, 2013. http://dx.doi.org/10.1109/icicm.2013.53.
Full textWei, K., M. Muthuprasanna, and Suraj Kothari. "Preventing SQL injection attacks in stored procedures." In Australian Software Engineering Conference (ASWEC'06). IEEE, 2006. http://dx.doi.org/10.1109/aswec.2006.40.
Full textEzumalai, R., and G. Aghila. "Combinatorial Approach for Preventing SQL Injection Attacks." In 2009 IEEE International Advance Computing Conference (IACC 2009). IEEE, 2009. http://dx.doi.org/10.1109/iadcc.2009.4809188.
Full textReports on the topic "SQL-Injection attacks"
Bri Rolston. Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems. Office of Scientific and Technical Information (OSTI), September 2005. http://dx.doi.org/10.2172/911631.
Full text