Author:
Hassan Md. Maruf,Risha Rafika,Esha Ashrafia
Publisher
Springer Nature Singapore
Reference25 articles.
1. OWASP top ten web application security risks. Available at https://owasp.org/www-project-top-ten/. Accessed June 2020
2. SANS Institute (2017) Available at https://www.sans.org/top25-software-errors. Accessed June 2020
3. Liu X, Yu Q, Zhou X, Zhou Q (2018) OwlEye: an advanced detection system of web attacks based on HMM. In: 2018 IEEE 16th international conference on dependable, autonomic and secure computing, 16th International conference on pervasive intelligence and computing, 4th International conference on big data intelligence and computing and cyber science and technology congress (DASC/PiCom/DataCom/CyberSciTech)
4. Alam D, Kabir MA, Bhuiyan T, Farah T (2015) A case study of SQL injection vulnerabilities assessment of .bd domain web applications. In: 2015 Fourth international conference on cyber security, cyber warfare, and digital forensic (CyberSec)
5. Alazab A, Khresiat A (2016) New strategy for mitigating of SQL injection attack. Int J Comput Appl 154:1–10