Dissertations / Theses on the topic 'Sql-injection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Sql-injection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Aryal, Dhiraj, and Anup Shakya. "A Taxonomy of SQL Injection Defense Techniques." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3076.
Full textBahureková, Beáta. "Technika SQL injection - její metody a způsoby ochrany." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-433304.
Full textCetin, Cagri. "Authentication and SQL-Injection Prevention Techniques in Web Applications." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7766.
Full textSjöström, Linus. "Detecting SQL Injection Attacks in VoIP using Real-time Deep Packet Inspection : Can a Deep Packet Inspection Firewall Detect SQL Injection Attacks on SIP Traffic with Reasonable Performance?" Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161072.
Full textTrumble, Brandon. "Using Code Inspection, Code Modification, and Machine Learning to prevent SQL Injection." Thesis, Kutztown University of Pennsylvania, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1590429.
Full textUwagbole, Solomon. "A pattern-driven corpus to predictive analytics in mitigating SQL injection attack." Thesis, Edinburgh Napier University, 2018. http://researchrepository.napier.ac.uk/Output/1538260.
Full textGopali, Gopali. "Protecting Web Applications from SQL Injection Attacks- Guidelines for Programmers Master Thesis." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20238.
Full textPandey, Amit Kumar. "Securing Web Applications From Application-Level Attack." Kent State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=kent1181098075.
Full textNorström, Alexander. "Measuring Accurancy of Vulnerability Scanners : An Evaluation with SQL Injections." Thesis, Linköpings universitet, Informationskodning, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-106628.
Full textScholte, Theodoor. "Amélioration de la sécurité par la conception des logiciels web." Thesis, Paris, ENST, 2012. http://www.theses.fr/2012ENST0024/document.
Full textLokby, Patrik, and Manfred Jönsson. "Preventing SQL Injections by Hashing the Query Parameter Data." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14922.
Full textKlock, Robert. "Quality of SQL Code Security on StackOverflow and Methods of Prevention." Oberlin College Honors Theses / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=oberlin1625831198110328.
Full textSmith, Grant Joseph. "Analysis and Prevention of Code-Injection Attacks on Android OS." Scholar Commons, 2014. https://scholarcommons.usf.edu/etd/5391.
Full textShahriar, Hossain. "Mutation-based testing of buffer overflows, SQL injections, and format string bugs." Thesis, Kingston, Ont. : [s.n.], 2008. http://hdl.handle.net/1974/1359.
Full textScholte, Theodoor. "Amélioration de la sécurité par la conception des logiciels web." Electronic Thesis or Diss., Paris, ENST, 2012. http://www.theses.fr/2012ENST0024.
Full textWheeler, Ryan. "BlindCanSeeQL: Improved Blind SQL Injection For DB Schema Discovery Using A Predictive Dictionary From Web Scraped Word Based Lists." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/6050.
Full textFriberg, Daniel. "WordPress och säkerhet inom tillägg från tredje parter : Skydda mot SQL-injection och Cross Site Scripting. Fallstudie av tre tillägg." Thesis, Karlstads universitet, Handelshögskolan, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-36439.
Full textMatti, Erik. "Evaluation of open source web vulnerability scanners and their techniques used to find SQL injection and cross-site scripting vulnerabilities." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177606.
Full textLundberg, Karl Johan. "Investigating the current state of securityfor small sized web applications." Thesis, Linköpings universitet, Databas och informationsteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-89160.
Full textKunwar, Ramesh, and Mustafa Al-Leddawi. "Reviewing Security and Privacy Aspects in Combined Mobile Information System (CMIS) for health care systems." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4649.
Full textMedlín, Dušan. "Nové technologie pro vývoj webových aplikací - Web 2.0." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217518.
Full textPrelgauskas, Justinas. "Vizitų registravimo sistemos projektavimas ir testavimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080710_150320-49423.
Full textLinnér, Samuel. "Graybox-baserade säkerhetstest : Att kostnadseffektivt simulera illasinnade angrepp." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2299.
Full textСтепанов, Андрій В’ячеславович, та Andrii Stepanov. "Удосконалення стандартних методів захисту веб-додатків". Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36798.
Full textNsambu, Emmanuel, and Danish Aziz. "The Defense Against the latest Cyber Espionage both insider and outsider attacks." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-16477.
Full textPanta, Purushottam. "Web Design, Development and Security." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1244819478.
Full textRegéciová, Dominika. "Aplikace teorie formálních jazyků v oblasti počítačové bezpečnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-386008.
Full textWhitelaw, Clayton. "Precise Detection of Injection Attacks on Concrete Systems." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/6051.
Full textPlašil, Matouš. "Soubor laboratorních úloh k demonstraci počítačových útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220402.
Full textPavlosek, Václav. "Webová aplikace pro výuku simulací v ns2." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218090.
Full textHolmberg, Daniel, and Victor Nyberg. "Functional and Security Testing of a Mobile Client-Server Application." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148710.
Full textKadlubiec, Jakub. "Mobilní systém pro sběr zpětné vazby zákazníků." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-236177.
Full text"A research in SQL injection." 2005. http://library.cuhk.edu.hk/record=b5892623.
Full text蘇學翔. "Exploiting SQL Injection with Semantic Polymorphism." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/tvz4mu.
Full textChen, Bo Han, and 陳柏翰. "Effective Practices For Defending SQL Injection Attacks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/89556774781629620492.
Full textLee, Jieh-Hua, and 李玠樺. "A Layer-based SQL Injection Prevention System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/86009733947954214171.
Full textWu, Ko-Chih, and 巫格至. "Automated Exploit Generation for SQL Injection Attacks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/66937924239857964035.
Full textLu, Chian-Huey, and 盧芊慧. "Web Platform Independent SQL injection Attack Generation." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/43099096080587428778.
Full textAich, Dibyendu. "Secure Query Processing by Blocking SQL Injection." Thesis, 2009. http://ethesis.nitrkl.ac.in/1504/1/thesis_to_upload.pdf.
Full textSarangi, A., and S. Panchamukhi. "Blocking SQL Injection in Database Stored Procedures." Thesis, 2010. http://ethesis.nitrkl.ac.in/1703/1/Blocking_sql_injection_in_database_stored_procedures.pdf.
Full textChia, Bernard, and 謝孟峰. "Web Forensic: Evidence of SQL Injection Attack Analysis." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/81060912022228427261.
Full textPieš, Martin. "Systém pro detekci napadení databáze metodou "SQL injection"." Master's thesis, 2010. http://www.nusl.cz/ntk/nusl-286260.
Full textLin, Che-Chia, and 林哲嘉. "Design and Implementation of SQL Injection Penetration System." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/95134447354413560501.
Full textThomas, Stephen M. "Using automated fix generation to mitigate SQL injection vulnerabilities." 2007. http://www.lib.ncsu.edu/theses/available/etd-11062007-151028/unrestricted/etd.pdf.
Full textMigli, Roberto, and 馬若權. "A fast, multi-platform method to detect SQL Injection Attacks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/66902532536363882776.
Full textBento, Pedro Ricardo Saraiva. "Assessing Web Services Robustness and Security Using Malicious Data Injection." Master's thesis, 2015. http://hdl.handle.net/10316/35521.
Full textWu, Ching-Ju, and 吳靜茹. "A Defense against SQL Injection Attack through Validation on Input Legitimacy." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/44317375982863901114.
Full textHuang, Hao-lun, and 黃浩倫. "TransSQL: A Translation and Validation-based Solution for SQL-Injection Attacks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/79047244359095359380.
Full textLai, Shu Mei, and 賴淑美. "Preventing SQL Injection Attacks Using the Field Attributes of User Input." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/72087296479960095398.
Full textYANG, SHENG-CHUAN, and 楊勝全. "Research on Constructing SQL Injection Defending System Based on Knowledge Base." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/f3a6qw.
Full text