Articoli di riviste sul tema "SQLIVS"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "SQLIVS".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Berry, Donna L., Brent A. Blumenstein, Barbara Halpenny, Seth Wolpin, Jesse R. Fann, Mary Austin-Seymour, Nigel Bush, Bryant T. Karras, William B. Lober e Ruth McCorkle. "Enhancing Patient-Provider Communication With the Electronic Self-Report Assessment for Cancer: A Randomized Trial". Journal of Clinical Oncology 29, n. 8 (10 marzo 2011): 1029–35. http://dx.doi.org/10.1200/jco.2010.30.3909.
Testo completoFu, Houlong, Chun Guo, Chaohui Jiang, Yuan Ping e Xiaodan Lv. "SDSIOT: An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic". Electronics 12, n. 11 (30 maggio 2023): 2472. http://dx.doi.org/10.3390/electronics12112472.
Testo completoSun, San-Tsai, e Konstantin Beznosov. "Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks". International Journal of Secure Software Engineering 1, n. 1 (gennaio 2010): 20–40. http://dx.doi.org/10.4018/jsse.2010102002.
Testo completoAblahd, Ann, e Suhair Dawwod. "Using Flask for SQLIA Detection and Protection". Tikrit Journal of Engineering Sciences 27, n. 2 (15 maggio 2020): 1–14. http://dx.doi.org/10.25130/tjes.27.2.01.
Testo completoGaffney, Kevin P., Martin Prammer, Larry Brasfield, D. Richard Hipp, Dan Kennedy e Jignesh M. Patel. "SQLite". Proceedings of the VLDB Endowment 15, n. 12 (agosto 2022): 3535–47. http://dx.doi.org/10.14778/3554821.3554842.
Testo completoAteeq Mohammed Draib, Najla’a, Abu Bakar Md Sultan, Abdul Azim B Abd Ghani e Hazura Zulzalil. "Comparison of Security Testing Approaches for Detection of SQL Injection Vulnerabilities". International Journal of Engineering & Technology 7, n. 4.1 (12 settembre 2018): 14. http://dx.doi.org/10.14419/ijet.v7i4.1.19483.
Testo completoAdinata, Putu Gio Satria, I. Putu Wira Pratama Putra, Ni Putu Adinda Indah Juliantari e Ketut Dita Ari Sutrisna. "Analisis Perbandingan Tools SQL Injection Menggunakan SQLmap, SQLsus dan The Mole". Informatik : Jurnal Ilmu Komputer 18, n. 3 (28 dicembre 2022): 286. http://dx.doi.org/10.52958/iftk.v18i3.5373.
Testo completoLee, Eunji. "Taming Performance Variability of Healthcare Data Service Frameworks with Proactive and Coarse-Grained Memory Cleaning". International Journal of Environmental Research and Public Health 16, n. 17 (26 agosto 2019): 3096. http://dx.doi.org/10.3390/ijerph16173096.
Testo completoDharmalingam, Jeya Mala, e M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks". International Journal of Intelligent Information Technologies 14, n. 3 (luglio 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.
Testo completoNidhal, Fyrooz, Hiba Naser R N, Nahida Abdul Latheef, Shahsitha Siddique V, Yomna Kalam A V e Neethu Prabhakaran P. "SQLIAD – A Hazard to Web Applications". International Journal of Computer Trends and Technology 29, n. 1 (25 novembre 2015): 15–18. http://dx.doi.org/10.14445/22312803/ijctt-v29p103.
Testo completoWang, Yongzhi, Yulong Shen, Cuicui Su, Jiawen Ma, Lingtong Liu e Xuewen Dong. "CryptSQLite: SQLite With High Data Security". IEEE Transactions on Computers 69, n. 5 (1 maggio 2020): 666–78. http://dx.doi.org/10.1109/tc.2019.2963303.
Testo completoWinslett, Marianne, e Vanessa Braganholo. "Richard Hipp Speaks Out on SQLite". ACM SIGMOD Record 48, n. 2 (19 dicembre 2019): 39–46. http://dx.doi.org/10.1145/3377330.3377338.
Testo completoLi, Jian Wei, Hong Guo e Yu Bin Xu. "Research on Optimization of SQLite Indexing Mechanism Based on Red-Black Tree". Applied Mechanics and Materials 220-223 (novembre 2012): 2711–15. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2711.
Testo completoSebastian, Anu, Richa Kuriakose e Surekha Mariam Varghese. "NEO4J, SQLITE and MYSQL for Hospital Localization". Advanced Computing: An International Journal 7, n. 3 (30 maggio 2016): 29–36. http://dx.doi.org/10.5121/acij.2016.7303.
Testo completoNemetz, Sebastian, Sven Schmitt e Felix Freiling. "A standardized corpus for SQLite database forensics". Digital Investigation 24 (marzo 2018): S121—S130. http://dx.doi.org/10.1016/j.diin.2018.01.015.
Testo completoZhang, Li, Shengang Hao e Quanxin Zhang. "Recovering SQLite data from fragmented flash pages". Annals of Telecommunications 74, n. 7-8 (20 febbraio 2019): 451–60. http://dx.doi.org/10.1007/s12243-019-00707-9.
Testo completoLiu, Jun Lin, e Qi Yuan Sun. "Information Processing Based on SQLite for Target Tracking System". Applied Mechanics and Materials 278-280 (gennaio 2013): 2065–68. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.2065.
Testo completoLashkaripour, Zeinab, e Abbas Ghaemi Bafghi. "A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs)". International Journal of Security and Its Applications 7, n. 5 (30 settembre 2013): 53–66. http://dx.doi.org/10.14257/ijsia.2013.7.5.05.
Testo completoZhu, Alex, e Wei Qi Yan. "Exploring Defense of SQL Injection Attack in Penetration Testing". International Journal of Digital Crime and Forensics 9, n. 4 (ottobre 2017): 62–71. http://dx.doi.org/10.4018/ijdcf.2017100106.
Testo completoDatsko, Oleh, e Elżbieta Miłosz. "Performance comparison between Xamarin and Java database operations". Journal of Computer Sciences Institute 7 (30 settembre 2018): 168–71. http://dx.doi.org/10.35784/jcsi.672.
Testo completoKar, Debabrata, Suvasini Panigrahi e Srikanth Sundararajan. "SQLiDDS: SQL injection detection using document similarity measure". Journal of Computer Security 24, n. 4 (16 agosto 2016): 507–39. http://dx.doi.org/10.3233/jcs-160554.
Testo completoNana Mbinkeu, Rodrigue Carlos, e Bernabé Batchakui. "Reducing Disk Storage with SQLite into BitCoin Architecture". International Journal of Recent Contributions from Engineering, Science & IT (iJES) 3, n. 2 (12 maggio 2015): 10. http://dx.doi.org/10.3991/ijes.v3i2.4490.
Testo completoBharadwaj, Y. V. Sai, Sai Bhageerath Yarrapatruni e Dr Prasada Rao YVSSSV. "SQLite Database and its Application on Embedded Platform". International Journal of Computer Trends and Technology 67, n. 2 (25 febbraio 2019): 1–6. http://dx.doi.org/10.14445/22312803/ijctt-v67i2p101.
Testo completoPark, Jong-Hyeok, Gihwan Oh e Sang-Won Lee. "SQL statement logging for making SQLite truly lite". Proceedings of the VLDB Endowment 11, n. 4 (dicembre 2017): 513–25. http://dx.doi.org/10.1145/3186728.3164146.
Testo completoWinasis, Persis Haryo, Raga Maulana e Yodi Susanto. "Designing Application For Defect Recording and Handover Of Property Based On Mobile Application by Applying SQLite Technology". CCIT Journal 13, n. 2 (27 agosto 2020): 185–95. http://dx.doi.org/10.33050/ccit.v13i2.990.
Testo completoShin, Jiho, e Jung-Taek Seo. "Verification of Privacy Protection Reliability through Mobile Forensic Approach Regarding iOS-Based Instant Messenger". Sustainability 14, n. 20 (15 ottobre 2022): 13281. http://dx.doi.org/10.3390/su142013281.
Testo completoHARIANI, HARIANI. "EKSPLORASI WEB BROWSER DALAM PENCARIAN BUKTI DIGITAL MENGGUNAKAN SQLITE". Jurnal INSTEK (Informatika Sains dan Teknologi) 6, n. 1 (6 gennaio 2021): 66. http://dx.doi.org/10.24252/instek.v6i1.18638.
Testo completoPetráš, Václav. "Implementation of SQLite database support in program gama-local". Geoinformatics FCE CTU 7 (29 dicembre 2011): 73–84. http://dx.doi.org/10.14311/gi.7.6.
Testo completoWang, Gang, e Ming Yu Zhao. "Study and Optimization of Database on Android Platform". Applied Mechanics and Materials 263-266 (dicembre 2012): 1754–58. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1754.
Testo completoPutra, Raden Bagus Dimas, Eko Setia Budi e Abdul Rahman Kadafi. "Perbandingan Antara SQLite, Room, dan RBDLiTe Dalam Pembuatan Basis Data pada Aplikasi Android". JURIKOM (Jurnal Riset Komputer) 7, n. 3 (14 giugno 2020): 376. http://dx.doi.org/10.30865/jurikom.v7i3.2161.
Testo completoFeng, Xing Li, Zhi Hai Suo, Yao Tang Wei e Mo Xu. "The Financial Management System Based on Android and SQLite". Applied Mechanics and Materials 462-463 (novembre 2013): 974–77. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.974.
Testo completoImam Farisi, Mukhaimy Gazali e Rudy Anshari. "SQLite Sebagai Pengganti Lucene.Net pada Pencarian Produk Toko Online". Jurnal CoSciTech (Computer Science and Information Technology) 1, n. 2 (31 ottobre 2020): 36–43. http://dx.doi.org/10.37859/coscitech.v1i2.2204.
Testo completoKabakuş, Abdullah Talha. "Pratik Açıdan SQLite ve Firebase Veritabanlarının Bir Performans Karşılaştırması". Düzce Üniversitesi Bilim ve Teknoloji Dergisi 7, n. 1 (31 gennaio 2019): 314–25. http://dx.doi.org/10.29130/dubited.441672.
Testo completoOh, Gihwan, Sangchul Kim, Sang-Won Lee e Bongki Moon. "SQLite optimization with phase change memory for mobile applications". Proceedings of the VLDB Endowment 8, n. 12 (agosto 2015): 1454–65. http://dx.doi.org/10.14778/2824032.2824044.
Testo completoBorovskoy, I. G., E. A. Shelmina e N. V. Zarikovskaya. "Text Data Storage Method Modification for SQLite Relational Database". Journal of Physics: Conference Series 803 (gennaio 2017): 012025. http://dx.doi.org/10.1088/1742-6596/803/1/012025.
Testo completoJeon, Sangjun, Jewan Bang, Keunduck Byun e Sangjin Lee. "A recovery method of deleted record for SQLite database". Personal and Ubiquitous Computing 16, n. 6 (24 luglio 2011): 707–15. http://dx.doi.org/10.1007/s00779-011-0428-7.
Testo completoChoi, Jin-oh. "Implementation and Experiment for Search Performance Analysis of SQLite Mobile Database". Journal of the Korea Institute of Information and Communication Engineering 21, n. 2 (28 febbraio 2017): 333–38. http://dx.doi.org/10.6109/jkiice.2017.21.2.333.
Testo completoAbogaa, Jennifer Bagulaya. "e-recognition of Motorbike License Plate using Python and SQLite". Indian Journal Of Science And Technology 15, n. 48 (27 dicembre 2022): 2757–64. http://dx.doi.org/10.17485/ijst/v15i48.1673.
Testo completoZhou, Bing. "Analysis of the Security Mechanism of Android and Countermeasures". Applied Mechanics and Materials 687-691 (novembre 2014): 2948–51. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2948.
Testo completoQin, Lu, Jeffrey Xu Yu e Lijun Chang. "Ten thousand SQLs". Proceedings of the VLDB Endowment 3, n. 1-2 (settembre 2010): 58–69. http://dx.doi.org/10.14778/1920841.1920854.
Testo completoBhagat, Siddhesh, R. R. Sedamkar e Prachi Janrao. "Preventing SQLIA using ORM Tool with HQL". International Journal of Applied Information Systems 11, n. 4 (6 settembre 2016): 44–47. http://dx.doi.org/10.5120/ijais2016451600.
Testo completoKumar, Pankaj, e C. P. Katti. "A Parallel-SQLIA Detector for Web Security". International Journal of Information Engineering and Electronic Business 8, n. 2 (8 marzo 2016): 66–75. http://dx.doi.org/10.5815/ijieeb.2016.02.08.
Testo completoLibkin, Leonid. "SQL’s Three-Valued Logic and Certain Answers". ACM Transactions on Database Systems 41, n. 1 (7 aprile 2016): 1–28. http://dx.doi.org/10.1145/2877206.
Testo completoXie, Cong, e Shao Jian Song. "Design of Door Monitoring Interface Based on Qt4 and SQLite". Applied Mechanics and Materials 556-562 (maggio 2014): 1592–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.1592.
Testo completoСуворов, Александр Павлович, e Сергей Петрович Зоткин. "Применение программы DB Browser for SQLite для создания баз данных". Естественные и Технические Науки, n. 09 (2020): 108–11. http://dx.doi.org/10.37882/2223-2966.2020.09.36.
Testo completoLokhande, Sharayu, e Vaishali Ganganwar. "Accessing and Modifying Sqlite Remotely for Catering Multi Client Access". International Journal of Science and Engineering Applications 4, n. 6 (19 novembre 2015): 350–52. http://dx.doi.org/10.7753/ijsea0406.1003.
Testo completoYamamoto, Moriki, e Hisao Koizumi. "An Experimental Evaluation using SQLite for Real-Time Stream Processing". Journal of International Council on Electrical Engineering 3, n. 1 (gennaio 2013): 68–72. http://dx.doi.org/10.5370/jicee.2013.3.1.068.
Testo completoRigin, A. M., e S. A. Shershakov. "SQLite RDBMS Extension for Data Indexing Using B-tree Modifications". Proceedings of the Institute for System Programming of the RAS 31, n. 3 (2019): 203–16. http://dx.doi.org/10.15514/ispras-2019-31(3)-16.
Testo completoKhwaldeh, Ali, Amani Tahat, Jordi Marti e Mofleh Tahat. "Atomic Data Mining Numerical Methods, Source Code SQlite with Python". Procedia - Social and Behavioral Sciences 73 (febbraio 2013): 232–39. http://dx.doi.org/10.1016/j.sbspro.2013.02.046.
Testo completoLiu, Chen Chen. "Research of Embedded Image Processing Based on ARM11 and SQLite". Applied Mechanics and Materials 373-375 (agosto 2013): 1603–6. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1603.
Testo completo