Journal articles on the topic 'Sql-injection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Sql-injection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bisson, R. "SQL injection." ITNOW 47, no. 2 (2005): 25. http://dx.doi.org/10.1093/itnow/bwi039.
Full textShar, Lwin Khin, and Hee Beng Kuan Tan. "Defeating SQL Injection." Computer 46, no. 3 (2013): 69–77. http://dx.doi.org/10.1109/mc.2012.283.
Full textWrightes, Jene. "SQL injection attacks." Advances in Engineering Innovation 2, no. 1 (2023): 26–31. http://dx.doi.org/10.54254/2977-3903/2/2023017.
Full textNagpal, Bharti, Naresh Chauhan, and Nanhay Singh. "A Viable Solution to Prevent SQL Injection Attack Using SQL Injection." i-manager's Journal on Computer Science 3, no. 3 (2015): 5–10. http://dx.doi.org/10.26634/jcom.3.3.3660.
Full textMr., Vishal Andodariya. "SQL Injection Attack Detection and Prevention Techniques to Secure Web Site." International Journal of Trend in Scientific Research and Development 2, no. 4 (2019): 624–28. https://doi.org/10.31142/ijtsrd13034.
Full textKusuma, Gregorius Hendy. "Analysis of SQL Injection Attacks on Website Service." bit-Tech 1, no. 1 (2018): 26–33. http://dx.doi.org/10.32877/bt.v1i1.3.
Full textMohd Yunus, Mohd Amin, Muhammad Zainulariff Brohan, Nazri Mohd Nawi, Ely Salwana Mat Surin, Nurhakimah Azwani Md Najib, and Chan Wei Liang. "Review of SQL Injection : Problems and Prevention." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (2018): 215. http://dx.doi.org/10.30630/joiv.2.3-2.144.
Full textDalai, Asish Kumar, and Sanjay Kumar Jena. "Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3825373.
Full textShalawati, Wa Ode Hardianas, Muh. Yamin, and Natalis Ransi. "IMPLEMENTASI TEKNOLOGI ENKRIPSI URL (UNIFORM RESOURCE LOCATOR) DAN LOGIN FORM MENGGUNAKAN ALGORITMA BLOWFISH UNTUK MENCEGAH SERANGAN SQL INJECTION." semanTIK 5, no. 2 (2019): 273–82. https://doi.org/10.5281/zenodo.3510178.
Full textJANG, Young-Su. "Detection of SQL Injection Vulnerability in Embedded SQL." IEICE Transactions on Information and Systems E103.D, no. 5 (2020): 1173–76. http://dx.doi.org/10.1587/transinf.2019edl8143.
Full textN, Asha, M. Varun Kumar, and Vaidhyanathan G. Vaidhyanathan.G. "Preventing SQL Injection Attacks." International Journal of Computer Applications 52, no. 13 (2012): 28–32. http://dx.doi.org/10.5120/8264-1809.
Full textSmithu B S, Leela C P, and Nagashree N. "SQL injection vulnerability analysis." World Journal of Advanced Research and Reviews 9, no. 1 (2021): 312–18. https://doi.org/10.30574/wjarr.2021.9.1.0018.
Full textB. Kalaiselvi, B. Kalaiselvi, Mannepalle Sai Chandu, Maridhu Narendra, and Mannepalle Deekshith Kumar. "SQL-Injection Vulnerability Scanning Tool for Automatic Creation of SQL-Injection Attacks." International Journal of Advances in Engineering and Management 7, no. 1 (2025): 577–87. https://doi.org/10.35629/5252-0701577587.
Full textBashah Mat Ali, Abdul, Ala’ Yaseen Ibrahim Shakhatreh, Mohd Syazwan Abdullah, and Jasem Alostad. "SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks." Procedia Computer Science 3 (2011): 453–58. http://dx.doi.org/10.1016/j.procs.2010.12.076.
Full textS.S., Anandha Krishnan. "SQL Injection Detection Using Machine Learning." Revista Gestão Inovação e Tecnologias 11, no. 3 (2021): 300–310. http://dx.doi.org/10.47059/revistageintec.v11i3.1939.
Full textMonica, Aprilia. "Pengukuran Efektivitas Serangan SQL Injection Pada Website Dengan Menggunakan Tools JSQL, Havij, Dan The Mole." Jurnal Informatika dan Teknologi Komputer ( J-ICOM) 4, no. 2 (2023): 65–71. https://doi.org/10.55377/j-icom.v4i2.6926.
Full textALAzzawi, Abdulbasit. "SQL Injection Detection Using RNN Deep Learning Model." Journal of Applied Engineering and Technological Science (JAETS) 5, no. 1 (2023): 531–41. http://dx.doi.org/10.37385/jaets.v5i1.2864.
Full textAburashed, Laila, Marah AL Amoush, and Wardeh Alrefai. "SQL Injection Attack Detection using Machine Learning Algorithms." Semarak International Journal of Machine Learning 2, no. 1 (2024): 1–12. http://dx.doi.org/10.37934/sijml.2.1.112.
Full textAburashed, Laila, Marah AL Amoush, and Wardeh Alrefai. "SQL Injection Attack Detection using Machine Learning Algorithms." Semarak International Journal of Machine Learning 2, no. 1 (2025): 1–12. https://doi.org/10.37934/sijml.2.1.112a.
Full textAlghawazi, Maha, Daniyal Alghazzawi, and Suaad Alarifi. "Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review." Journal of Cybersecurity and Privacy 2, no. 4 (2022): 764–77. http://dx.doi.org/10.3390/jcp2040039.
Full textAprilia Monica Sari, Trihana Santhi, Dewa Ketut Alit Maha Putra, Muhamad Bintang Haekal, I Made Edy Listartha, and Gede Arna Jude Saskara. "PENGUKURAN EFEKTIVITAS SERANGAN SQL INJECTION PADA WEBSITE DENGAN MENGGUNAKAN TOOLS JSQL, HAVIJ, DAN THE MOLE." Jurnal Informatika Dan Tekonologi Komputer (JITEK) 3, no. 1 (2023): 35–42. http://dx.doi.org/10.55606/jitek.v3i1.905.
Full textK.Kolhe, Abhay, and Pratik Adhikari. "Injection, Detection, Prevention of SQL Injection Attacks." International Journal of Computer Applications 87, no. 7 (2014): 40–43. http://dx.doi.org/10.5120/15224-3739.
Full textEt. al., Leelavathy S,. "A Secure Methodology to Detect and Prevent Ddos and Sql Injection Attacks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (2021): 341–46. http://dx.doi.org/10.17762/turcomat.v12i2.722.
Full textChen, Zhuang, Min Guo, and Lin zhou. "Research on SQL injection detection technology based on SVM." MATEC Web of Conferences 173 (2018): 01004. http://dx.doi.org/10.1051/matecconf/201817301004.
Full textFahmi Al Azhar, Muhammad, and Ruki Harwahyu. "DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS." MULTITEK INDONESIA 17, no. 1 (2023): 69–78. http://dx.doi.org/10.24269/mtkind.v17i1.7267.
Full textParameswari, S., and K. Kavitha. "SQL Injection Attack on Web Application." Asian Journal of Computer Science and Technology 7, S1 (2018): 11–15. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1814.
Full textSarajaldeen Akram Bahjat Arif. "The Theoretical Foundations and Literature Analysis a Hybrid Detection Technique Against Malicious SQL Attacks on Web Applications." Journal of Information Systems Engineering and Management 10, no. 35s (2025): 1093–100. https://doi.org/10.52783/jisem.v10i35s.6218.
Full textGusti Ayu Mas Ekayanti, Dewa Ayu Deby Cintiya, Putu Yoga Suartana, Rama Ngurah Putera Pinatih, Gede Arna Jude Saskara, and I Made Edy Listartha. "PERBANDINGAN TOOLS SQL SUS, SQL NINJA, DAN THE MOLE DALAM PENERAPAN SQL INJECTION." Jurnal Informatika Teknologi dan Sains 4, no. 4 (2022): 478–82. http://dx.doi.org/10.51401/jinteks.v4i4.2201.
Full textChauhan, C. U., Kunal Wadhai,, Rohan Raut,, Shriram Raut,, Aditya Nikode, and Vaibhav Pachbhai,. "Network Intrusion Detection System for SQL Injection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43662.
Full textHafriadi, Fajar Dzulnufrie, and Rizka Ardiansyah. "NETWORK'S ACCESS LOG CLASSIFICATION FOR DETECTING SQL INJECTION ATTACKS WITH THE LSTM ALGORITHM." Jurnal Teknik Informatika (Jutif) 5, no. 4 (2024): 745–52. https://doi.org/10.52436/1.jutif.2024.5.4.2157.
Full textJesennia, Iñiguez Banegas, Guamán Quinché Rene, Figueroa Diaz Robert, and Ajila Zaquinaula Freddy. "Systematic Literature Review: SQL Injection in Web Applications." Latin-American Journal of Computing 3, no. 2 (2016): 65–72. https://doi.org/10.5281/zenodo.5750713.
Full textHalib, Badaruddin Bin, Edy Budiman, and Hario Jati Setyadi. "Teknik Hacking Web Server Dengan Sqlmap Di Kali Linux." Jurnal Rekayasa Teknologi Informasi (JURTI) 1, no. 1 (2017): 67. http://dx.doi.org/10.30872/jurti.v1i1.642.
Full textAbebe, Anduamlak, Yonas Belay, Adane Belay, and Seffi Gebeyehu. "SQL INJECTION ATTACKS DETECTION: A PERFORMANCE COMPARISON ON MULTIPLE CLASSIFICATION MODELS." Ethiopian International Journal of Engineering and Technology 2, no. 1 (2024): 22–38. http://dx.doi.org/10.59122/154cfc15.
Full textAlanda, Alde, Deni Satria, M. Isthofa Ardhana, Andi Ahmad Dahlan, and Hanriyawan Adnan Mooduto. "Web Application Penetration Testing Using SQL Injection Attack." JOIV : International Journal on Informatics Visualization 5, no. 3 (2021): 320. http://dx.doi.org/10.30630/joiv.5.3.470.
Full textSenouci, Oussama, and Nadjib Benaouda. "Advanced deep learning framework for detecting SQL injection attacks based on GRU Model." STUDIES IN ENGINEERING AND EXACT SCIENCES 5, no. 2 (2024): e11299. https://doi.org/10.54021/seesv5n2-596.
Full textKartheek, Pamarthi. "Artificial Intelligence and Machine Learning Techniques to Control SQL Injection Attacks." Journal of Scientific and Engineering Research 7, no. 4 (2020): 259–67. https://doi.org/10.5281/zenodo.13348395.
Full textSupartini, Reni, and Jumadi Mabe Parenreng. "Deteksi Serangan SQL Injection pada Website dengan Menggunakan Metode Reguler Expression." Progressive Information, Security, Computer, and Embedded System 1, no. 2 (2023): 107–14. http://dx.doi.org/10.61255/pisces.v1i2.101.
Full textSheng, Jingyuan. "Research on SQL Injection Attack and Defense Technology of Power Dispatching Data Network: Based on Data Mining." Mobile Information Systems 2022 (July 30, 2022): 1–8. http://dx.doi.org/10.1155/2022/6207275.
Full textOchieng Okello, Fredrick. "A STUDY OF MACHINE LEARNING-BASED APPROACHES FOR SQL INJECTION DETECTION AND PREVENTION." International Journal of Advanced Research 13, no. 02 (2025): 1035–44. https://doi.org/10.21474/ijar01/20461.
Full textPawar, Abhishek, Nikita Kapadnis, Pallavi Joshi, Vishwjeet Kalyankar, Raj Gharat, and Vedant Khokle. "Detecting Data Leaks due to SQL Injection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–7. https://doi.org/10.55041/ijsrem39512.
Full textMane, Sulakshana B., Kiran Shrimant Kakade, S. P. Shingare, and Nanasaheb M. Halgare. "SQL injection authentication security threat." International Journal of Electronic Security and Digital Forensics 16, no. 4 (2024): 474–85. http://dx.doi.org/10.1504/ijesdf.2024.139661.
Full textUllrich, Johannes B., and Jason Lam. "Defacing websites via SQL injection." Network Security 2008, no. 1 (2008): 9–10. http://dx.doi.org/10.1016/s1353-4858(08)70007-2.
Full textAlenezi, Mamdouh, Muhammad Nadeem, and Raja Asif. "SQL injection attacks countermeasures assessments." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 1121. http://dx.doi.org/10.11591/ijeecs.v21.i2.pp1121-1131.
Full textDora, Jean Rosemond, Ladislav Hluchý, and Karol Nemoga. "Ontology for Blind SQL Injection." Computing and Informatics 42, no. 2 (2023): 480–500. http://dx.doi.org/10.31577/cai_2023_2_480.
Full textAlenezi, Mamdouh, Muhammad Nadeem, and Raja Asif. "SQL injection attacks countermeasures assessments." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 1121–31. https://doi.org/10.11591/ijeecs.v21.i2.pp1121-1131.
Full textBastos, Rafael Rodrigues, and Felipe Boeira de Magalhães. "SQL Injection: Entendendo e evitando." Cuadernos de Educación y Desarrollo 17, no. 3 (2025): e7856. https://doi.org/10.55905/cuadv17n3-107.
Full textSelvi, M., M. Maheswari, A. Christy, Theresa M. Mercy, A. Jesudoss, and V. Ulagamuthalvi. "Analysis and implementation of SQL injection attack and countermeasures using SQL injection prevention techniques." International Journal of Engineering Systems Modelling and Simulation 1, no. 1 (2022): 1. http://dx.doi.org/10.1504/ijesms.2022.10045315.
Full textJesudoss, A., Theresa M. Mercy, A. Christy, M. Maheswari, M. Selvi, and V. Ulagamuthalvi. "Analysis and implementation of SQL injection attack and countermeasures using SQL injection prevention techniques." International Journal of Engineering Systems Modelling and Simulation 13, no. 4 (2022): 262. http://dx.doi.org/10.1504/ijesms.2022.126305.
Full textNatarajan, Kanchana, and Sarala Subramani. "Generation of Sql-injection Free Secure Algorithm to Detect and Prevent Sql-Injection Attacks." Procedia Technology 4 (2012): 790–96. http://dx.doi.org/10.1016/j.protcy.2012.05.129.
Full textMahrouqi, A., P. Tobin, S. Abdalla, and T. Kechadi. "Simulating SQL-Injection Cyber-Attacks Using GNS3." International Journal of Computer Theory and Engineering 8, no. 3 (2016): 213–17. http://dx.doi.org/10.7763/ijcte.2016.v8.1046.
Full text