Publisher
Springer Science and Business Media LLC
Reference26 articles.
1. Jing, X.; Yan, Z.; Pedrycz, W.: Security data collection and data analytics in the internet: a survey. IEEE Commun. Surv. Tutor. 21(1), 586–618 (2019). https://doi.org/10.1109/COMST.2018.2863942
2. Khochare, N.; Chalurkar, S.; Kakade, S.; Meshramm, B.: Survey on SQL injection attacks and their countermeasures. Int. J. Comput. Eng. Manag. (IJCEM) 14, 1–14 (2011)
3. LaPiedra, J.: The information security process: prevention, detection, and response. GIAC Certification. Sans
Institute, pp. 1–7 (2002)
4. Bai, K., Liu, P.: A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, EDBT ’09, pp. 720–731. ACM, New York, NY, USA (2009). https://doi.org/10.1145/1516360.1516443.
5. Panda, B., Yalamanchili, R.: Transaction fusion in the wake of information warfare. In: Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), March 11–14, 2001, Las Vegas, NV, USA, pp. 242–247 (2001). https://doi.org/10.1145/372202.372333
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献