//--> //--> //-->
Toggle navigation
Logout
Change account settings
EN
DE
ES
FR
A-Z
Beta
About EconBiz
News
Thesaurus (STW)
Academic Skills
Help
EN
DE
ES
FR
My account
Logout
Change account settings
Login
Publications
Events
Your search terms
Search
Search options
All Fields
Title
Exact title
Subject
Author
Institution
ISBN/ISSN
Published in...
Publisher
Open Access only
Advanced
Search history
My EconBiz
Favorites
Loans
Reservations
Fines
You are here:
Home
Search: subject:"SQL injection"
Narrow search
Narrow search
Year of publication
From:
To:
Subject
All
SQL Injection
2
SQL injection
2
Anomaly Detection
1
Artificial Intelligence
1
Authentication
1
Authorization
1
Code Injection
1
Cross-Site Scripting
1
DDoS Attack
1
Data security
1
Database
1
Database Protection
1
Databases
1
Datenbank
1
Datensicherheit
1
Fuzzy Logic System
1
Hacking
1
IT crime
1
IT-Kriminalität
1
Information Security
1
Intrusion Detection
1
Machine Learning
1
Neural Networks
1
Remote File Inclusion
1
Risk Assessment
1
SQL Injection Attack
1
SQL Injection Attacks
1
Session Vulnerablity
1
Social Web
1
Social web
1
Software
1
Software development
1
Softwareentwicklung
1
Web Application Vulnerabilities
1
Web Attacks
1
Web Security
1
buffer overflow
1
database security
1
digital signature
1
hacking
1
more ...
less ...
Online availability
All
Undetermined
4
Type of publication
All
Article
5
Book / Working Paper
1
Type of publication (narrower categories)
All
Article in journal
1
Aufsatz in Zeitschrift
1
Language
All
English
5
Undetermined
1
Author
All
Bucea Manea Tonis, Radu
1
Bukkawar, Mrunali
1
Funaseeli, N.
1
Haddad, Hisham
1
Mala, D. Jeya
1
Pathan, Mohd. Shafi
1
Shahriar, Hossain
1
Sheykhkanloo, Naghmeh Moradpoor
1
Yan, Wei Qi
1
Zhu, Alex
1
more ...
less ...
Institution
All
Facultatea de Finante şi Banci, Universitatea Spiru Haret
1
Published in...
All
International Journal of Cyber Warfare and Terrorism (IJCWT)
1
International Journal of Digital Crime and Forensics (IJDCF)
1
International Journal of Secure Software Engineering (IJSSE)
1
International Journal of Synthetic Emotions (IJSE)
1
International journal of information systems and change management : IJISCM
1
Papers / Facultatea de Finante şi Banci, Universitatea Spiru Haret
1
Source
All
Other ZBW resources
4
ECONIS (ZBW)
1
RePEc
1
Showing
1
-
6
of
6
Sort
relevance
articles prioritized
date (newest first)
date (oldest first)
1
A Learning-based Neural Network Model for the Detection and Classification of
SQL
Injection
Attacks
Sheykhkanloo, Naghmeh Moradpoor
- In:
International Journal of Cyber Warfare and Terrorism (IJCWT)
7
(
2017
)
2
,
pp. 16-41
Structured Query Language injection (SQLi) attack is a code injection technique where hackers inject SQL commands into a database via a vulnerable web application. Injected SQL commands can modify the back-end SQL database and thus compromise the security of a web application. In the previous...
Persistent link: https://www.econbiz.de/10012043885
Saved in:
2
Exploring Defense of
SQL
Injection
Attack in Penetration Testing
Zhu, Alex
;
Yan, Wei Qi
- In:
International Journal of Digital Crime and Forensics (IJDCF)
9
(
2017
)
4
,
pp. 62-71
SQLIA is adopted to attack websites with and without confidential information. Hackers utilized the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enlarging the scale of Distributed Denial of Service Attack (DDoS). The DDoS is...
Persistent link: https://www.econbiz.de/10012043955
Saved in:
3
Web-Proxy-Based Authentication and Authorization Mechanism Against Client-Based HTTP Attacks
Pathan, Mohd. Shafi
;
Bukkawar, Mrunali
- In:
International Journal of Synthetic Emotions (IJSE)
8
(
2017
)
1
,
pp. 60-72
There has been a huge development in how to read a data from sensor device such as infrared (IR) device, temperature device, etc. Sensor data collection has wide issues of information security. Information security is also the current topic of discussion due to its use in application in various...
Persistent link: https://www.econbiz.de/10012047569
Saved in:
4
Securing web applications from SQLIA using progressive detector
Funaseeli, N.
;
Mala, D. Jeya
- In:
International journal of information systems and change …
9
(
2017
)
1
,
pp. 44-69
Persistent link: https://www.econbiz.de/10011850380
Saved in:
5
Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications
Shahriar, Hossain
;
Haddad, Hisham
- In:
International Journal of Secure Software Engineering (IJSSE)
7
(
2016
)
2
,
pp. 1-18
This paper addresses the problem of assessing risk in web application due to implementation level vulnerabilities. In particular, the authors address the common research challenge of finding enough historical data to compute the probability of vulnerabilities and exploitations. They develop a...
Persistent link: https://www.econbiz.de/10012048071
Saved in:
6
INTERNET SECURITY
Bucea Manea Tonis, Radu
-
Facultatea de Finante şi Banci, Universitatea Spiru Haret
-
2009
describes configuration techniques for safe use of the PHP language and ends with an example code to counter attacks of
SQL
…
Injection
. …
Persistent link: https://www.econbiz.de/10004983364
Saved in:
Results per page
10
25
50
100
250
A service of the
zbw
×
Loading...
//-->