1. Focardi, R., Luccio, F., & Squarcina, M. (2012). Fast sql blind injections in high latency networks. In 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL) (pp. 1–6), October 2012.
2. Benjamin, A. (2016). Search-based SQL injection attacks testing using genetic programming. In Genetic Programming: 19th European Conference, EuroGP 2016, Porto, Portugal (pp. 183–198), March 30–April 1, 2016.
3. Dharam, R., & Shiva, S. (2012). Runtime monitors for tautology based sql injection attacks. In International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) (pp. 253–258), June 2012.
4. Owasp top 10-2013. https://www.owasp.org/. The ten most critical web application security risks.
5. Zeng, H. (2013). Research on developing an attack and defense lab environment for cross site scripting education in higher vocational colleges. In 2013 Fifth International Conference on Computational and Information Sciences (ICCIS) (pp. 1971–1974), June 2013.