Author:
Xia Song,Qiu Meikang,Liu Meiqin,Zhong Ming,Zhao Hui
Publisher
Springer International Publishing
Reference20 articles.
1. Thakur, K., Qiu, M., Gai, K., Ali, M.: An investigation on cyber security threats and security models. In: 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, pp. 307–311. IEEE, New York, November 2015
2. Tidwell, K., Saurabh, K., Dash, D., Njemanze, H.S., Kothari, P.S.: Threat detection in a network security system. U.S. Patent 7,260,844. Washington, DC, August 2007
3. Alfayyadh, B., Ponting, J., Alzomai, M., Jøsang, A.: Vulnerabilities in personal firewalls caused by poor security usability. In: 2010 IEEE International Conference on Information Theory and Information Security, pp. 682–688, Beijing, January 2011
4. Rietta, F.: Application layer intrusion detection for SQL injection. In: ACM-SE 44 Proceedings of the 44th Annual Southeast Regional Conference, pp. 531–536, Florida, March 2016
5. Ross, K.: SQL injection detection using machine learning techniques and multiple data sources. Master’s Projects. 650.
https://doi.org/10.31979/etd.zknb-4z36
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献