Journal articles on the topic 'SQL-Injection attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SQL-Injection attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Nugroho, Aldebaran Bayu, and Satria Mandala. "Study the Best PenTest Algorithm for Blind SQL Injection Attacks." International Journal on Information and Communication Technology (IJoICT) 5, no. 2 (June 10, 2020): 1. http://dx.doi.org/10.21108/ijoict.2019.52.268.
Full textEt. al., Leelavathy S,. "A Secure Methodology to Detect and Prevent Ddos and Sql Injection Attacks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 341–46. http://dx.doi.org/10.17762/turcomat.v12i2.722.
Full textN, Asha, M. Varun Kumar, and Vaidhyanathan G. Vaidhyanathan.G. "Preventing SQL Injection Attacks." International Journal of Computer Applications 52, no. 13 (August 30, 2012): 28–32. http://dx.doi.org/10.5120/8264-1809.
Full textSilva, Rui Filipe, Raul Barbosa, and Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Full textDalai, Asish Kumar, and Sanjay Kumar Jena. "Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3825373.
Full textKusuma, Gregorius Hendy. "Analysis of SQL Injection Attacks on Website Service." bit-Tech 1, no. 1 (September 18, 2018): 26–33. http://dx.doi.org/10.32877/bt.v1i1.3.
Full textMahrouqi, A., P. Tobin, S. Abdalla, and T. Kechadi. "Simulating SQL-Injection Cyber-Attacks Using GNS3." International Journal of Computer Theory and Engineering 8, no. 3 (June 2016): 213–17. http://dx.doi.org/10.7763/ijcte.2016.v8.1046.
Full textDharam, Ramya, and Sajjan G. Shiva. "Runtime Monitoring Framework for SQL Injection Attacks." International Journal of Engineering and Technology 6, no. 5 (2014): 392–401. http://dx.doi.org/10.7763/ijet.2014.v6.731.
Full textAbdulmalik, Yazeed. "An Improved SQL Injection Attack Detection Model Using Machine Learning Techniques." International Journal of Innovative Computing 11, no. 1 (April 28, 2021): 53–57. http://dx.doi.org/10.11113/ijic.v11n1.300.
Full textJ. Santhosh Kumar, B., and P. P. Anaswara. "Vulnerability detection and prevention of SQL injection." International Journal of Engineering & Technology 7, no. 2.31 (May 29, 2018): 16. http://dx.doi.org/10.14419/ijet.v7i2.31.13388.
Full textSreeja, T., Dr Manna Sheela Rani Chetty, and Sekhar Babu Boddu. "Detecting SQL Injection Using Correlative Log Analysis." International Journal of Engineering & Technology 7, no. 2.32 (May 31, 2018): 389. http://dx.doi.org/10.14419/ijet.v7i2.32.15720.
Full textAlenezi, Mamdouh, Muhammad Nadeem, and Raja Asif. "SQL injection attacks countermeasures assessments." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (February 1, 2021): 1121. http://dx.doi.org/10.11591/ijeecs.v21.i2.pp1121-1131.
Full textKumar, Ashish, and Sumitra Binu. "Proposed Method for SQL Injection Detection and its Prevention." International Journal of Engineering & Technology 7, no. 2.6 (March 11, 2018): 213. http://dx.doi.org/10.14419/ijet.v7i2.6.10569.
Full textPan, Wu Min. "Method to Detect SQL Injection Attacks for Complex Network Environment." Advanced Materials Research 651 (January 2013): 841–45. http://dx.doi.org/10.4028/www.scientific.net/amr.651.841.
Full textK.Kolhe, Abhay, and Pratik Adhikari. "Injection, Detection, Prevention of SQL Injection Attacks." International Journal of Computer Applications 87, no. 7 (February 14, 2014): 40–43. http://dx.doi.org/10.5120/15224-3739.
Full textParameswari, S., and K. Kavitha. "SQL Injection Attack on Web Application." Asian Journal of Computer Science and Technology 7, S1 (November 5, 2018): 11–15. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1814.
Full textAlNabulsi, Hussein, Izzat Alsmadi, and Mohammad Al Jarrah. "Textual Manipulation for SQL Injection Attacks." International Journal of Computer Network and Information Security 6, no. 1 (November 7, 2013): 26–33. http://dx.doi.org/10.5815/ijcnis.2014.01.04.
Full textMorgan, David. "Web application security – SQL injection attacks." Network Security 2006, no. 4 (April 2006): 4–5. http://dx.doi.org/10.1016/s1353-4858(06)70353-1.
Full textShahriar, Hossain, Sarah North, and Wei-Chuen Chen. "Early Detection of SQL Injection Attacks." International Journal of Network Security & Its Applications 5, no. 4 (July 31, 2013): 53–65. http://dx.doi.org/10.5121/ijnsa.2013.5404.
Full textPathak, Ruta, Ananta Bhatt, and Shivam Choudhary. "Devising Solution to SQL Injection Attacks." International Journal of Computer Applications 154, no. 2 (November 17, 2016): 25–27. http://dx.doi.org/10.5120/ijca2016912037.
Full textSharma, Kirti, and Shobha Bhatt. "SQL injection attacks - a systematic review." International Journal of Information and Computer Security 11, no. 4/5 (2019): 493. http://dx.doi.org/10.1504/ijics.2019.10023476.
Full textSharma, Kirti, and Shobha Bhatt. "SQL injection attacks - a systematic review." International Journal of Information and Computer Security 11, no. 4/5 (2019): 493. http://dx.doi.org/10.1504/ijics.2019.101937.
Full textBashah Mat Ali, Abdul, Ala’ Yaseen Ibrahim Shakhatreh, Mohd Syazwan Abdullah, and Jasem Alostad. "SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks." Procedia Computer Science 3 (2011): 453–58. http://dx.doi.org/10.1016/j.procs.2010.12.076.
Full textKrawczyński, Bogdan, Jarosław Marucha, and Grzegorz Kozieł. "Analysis of protection capabilities against SQL Injection attacks." Journal of Computer Sciences Institute 7 (September 30, 2018): 150–57. http://dx.doi.org/10.35784/jcsi.664.
Full textBangkit Wiguna, Wahyu Adi Prabowo, and Ridho Ananda. "Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (November 3, 2020): 245–56. http://dx.doi.org/10.31849/digitalzone.v11i2.4867.
Full textMohd Yunus, Mohd Amin, Muhammad Zainulariff Brohan, Nazri Mohd Nawi, Ely Salwana Mat Surin, Nurhakimah Azwani Md Najib, and Chan Wei Liang. "Review of SQL Injection : Problems and Prevention." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (June 6, 2018): 215. http://dx.doi.org/10.30630/joiv.2.3-2.144.
Full textBansal, Yogesh, and Jin H. Park. "Multi-hashing for Protecting Web Applications from SQL Injection Attacks." International Journal of Computer and Communication Engineering 4, no. 3 (2015): 187–95. http://dx.doi.org/10.17706/ijcce.2015.4.3.187-195.
Full textPancholi, Rahul, Indr jeet Rajput, and Vinit Kumar Vinit Kumar. "Security of Database Query Processing by Blocking SQL Injection Attacks." International Journal of Scientific Research 2, no. 6 (June 1, 2012): 212–14. http://dx.doi.org/10.15373/22778179/june2013/67.
Full textRawat, Romil, Chandrapal Singh Dangi, and Jagdish Patil. "Safe Guard Anomalies against SQL Injection Attacks." International Journal of Computer Applications 22, no. 2 (May 31, 2011): 11–14. http://dx.doi.org/10.5120/2558-3511.
Full textG. Kumar, Diksha, and Madhumita Chatterjee. "Detection Block Model for SQL Injection Attacks." International Journal of Computer Network and Information Security 6, no. 11 (October 8, 2014): 56–63. http://dx.doi.org/10.5815/ijcnis.2014.11.08.
Full textShrivastava, Gaurav, and Kshitij Pathak. "SQL Injection Attacks: Technique and Prevention Mechanism." International Journal of Computer Applications 69, no. 7 (May 17, 2013): 35–39. http://dx.doi.org/10.5120/11857-7626.
Full textCecchini, Simone, and Diane Gan. "SQL injection attacks with the AMPA suite." International Journal of Electronic Security and Digital Forensics 5, no. 2 (2013): 139. http://dx.doi.org/10.1504/ijesdf.2013.055051.
Full textYiğit, Gülsüm, and Merve Arnavutoğlu. "SQL Injection Attacks Detection & Prevention Techniques." International Journal of Computer Theory and Engineering 9, no. 5 (2017): 351–56. http://dx.doi.org/10.7763/ijcte.2017.v9.1165.
Full textChen, Zhuang, Min Guo, and Lin zhou. "Research on SQL injection detection technology based on SVM." MATEC Web of Conferences 173 (2018): 01004. http://dx.doi.org/10.1051/matecconf/201817301004.
Full textNatarajan, Kanchana, and Sarala Subramani. "Generation of Sql-injection Free Secure Algorithm to Detect and Prevent Sql-Injection Attacks." Procedia Technology 4 (2012): 790–96. http://dx.doi.org/10.1016/j.protcy.2012.05.129.
Full textKiskis, Akvile. "Why SQL Injection Attacks Are Still Plaguing Databases." International Journal of Hyperconnectivity and the Internet of Things 3, no. 2 (July 2019): 11–18. http://dx.doi.org/10.4018/ijhiot.2019070102.
Full textSingh, Shubham, Pranju Mishra, Samruddhi Kshirsagar, Shubham Bharadia, and Narendra Joshi. "SQL Injection and Areas of Security Concern." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 60–66. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.006.
Full textHa, Man-Seok, Jung-Il Namgung, and Soo-Hyun Park. "Counter Measures by using Execution Plan Analysis against SQL Injection Attacks." Journal of the Institute of Electronics and Information Engineers 53, no. 2 (February 25, 2016): 76–86. http://dx.doi.org/10.5573/ieie.2016.53.2.076.
Full textLesko, S. A. "Models and scenarios of implementation of threats for internet resources." Russian Technological Journal 8, no. 6 (December 18, 2020): 9–33. http://dx.doi.org/10.32362/2500-316x-2020-8-6-9-33.
Full textGunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik, and Nanang Ismail. "Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.
Full textByzdra, Chrystian, and Grzegorz Kozieł. "Analysis of the defending possibilities against SQL Injection attacks." Journal of Computer Sciences Institute 13 (December 30, 2019): 339–44. http://dx.doi.org/10.35784/jcsi.1329.
Full textRaghuvanshi, Kamlesh Kumar, and Deen Bandhu Dixit. "Prevention and Detection Techniques for SQL Injection Attacks." International Journal of Computer Trends and Technology 12, no. 3 (June 25, 2014): 107–10. http://dx.doi.org/10.14445/22312803/ijctt-v12p121.
Full textKaur, Manveen. "Token Sequencing Approach to Prevent SQL Injection Attacks." IOSR Journal of Computer Engineering 1, no. 1 (2012): 31–37. http://dx.doi.org/10.9790/0661-0113137.
Full textKaur, Navdeep, and Parminder Kaur. "Mitigation of SQL Injection Attacks using Threat Modeling." ACM SIGSOFT Software Engineering Notes 39, no. 6 (December 9, 2014): 1–6. http://dx.doi.org/10.1145/2674632.2674638.
Full textTiwari, Preshika. "Prevention of SQL Injection Attacks having XML Database." IOSR Journal of Computer Engineering 14, no. 6 (2013): 60–68. http://dx.doi.org/10.9790/0661-1466068.
Full textMitropoulos, Dimitris, and Diomidis Spinellis. "SDriver: Location-specific signatures prevent SQL injection attacks." Computers & Security 28, no. 3-4 (May 2009): 121–29. http://dx.doi.org/10.1016/j.cose.2008.09.005.
Full textJang, Young-Su, and Jin-Young Choi. "Detecting SQL injection attacks using query result size." Computers & Security 44 (July 2014): 104–18. http://dx.doi.org/10.1016/j.cose.2014.04.007.
Full textWan, Min, and Kun Liu. "A Research of the Essence of SQL Injection Attacks Vulnerability." Applied Mechanics and Materials 719-720 (January 2015): 935–40. http://dx.doi.org/10.4028/www.scientific.net/amm.719-720.935.
Full textGurina, Anastasia, and Vladimir Eliseev. "Anomaly-Based Method for Detecting Multiple Classes of Network Attacks." Information 10, no. 3 (February 26, 2019): 84. http://dx.doi.org/10.3390/info10030084.
Full textSheykhkanloo, Naghmeh Moradpoor. "A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks." International Journal of Cyber Warfare and Terrorism 7, no. 2 (April 2017): 16–41. http://dx.doi.org/10.4018/ijcwt.2017040102.
Full text