Author:
Vemulakonda Rajesh,Venkatesh Ketha
Reference10 articles.
1. Halfond, W.G., Viegas, J., Orso, A.: A classification of SQL-injection attacks and countermeasures. In: Proceedings of the IEEE International Symposium on Secure Software Engineering, vol. 1, pp. 13–15. IEEE (2006)
2. Buja, G., Jalil, K.B.A., Ali, F.B.H.M., Rahman, T.F.A.: Detection model for SQL injection attack: an approach for preventing a web application from the SQL injection attack. In: 2014 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), pp. 60–64. IEEE (2014)
3. Appelt, D., Nguyen, C.D., Briand, L.: Behind an application firewall, are we safe from SQL injection attacks? In: 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST), pp. 1–10. IEEE (2015)
4. Alwan, Z.S., Younis, M.F.: Detection and prevention of SQL injection attack: a survey. Int. J. Comput. Sci. Mobile Comput. 6(8), 5–17 (2017)
5. Husák, M., Velan, P., Vykopal, J.: Security monitoring of http traffic using extended flows. In: 2015 10th International Conference on, Availability, Reliability and Security (ARES), pp. 258–265. IEEE (2015)