EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"SQL injection"
Narrow search

Narrow search

Year of publication
Subject
All
SQL Injection 2 SQL injection 2 Anomaly Detection 1 Artificial Intelligence 1 Authentication 1 Authorization 1 Code Injection 1 Cross-Site Scripting 1 DDoS Attack 1 Data security 1 Database 1 Database Protection 1 Databases 1 Datenbank 1 Datensicherheit 1 Fuzzy Logic System 1 Hacking 1 IT crime 1 IT-Kriminalität 1 Information Security 1 Intrusion Detection 1 Machine Learning 1 Neural Networks 1 Remote File Inclusion 1 Risk Assessment 1 SQL Injection Attack 1 SQL Injection Attacks 1 Session Vulnerablity 1 Social Web 1 Social web 1 Software 1 Software development 1 Softwareentwicklung 1 Web Application Vulnerabilities 1 Web Attacks 1 Web Security 1 buffer overflow 1 database security 1 digital signature 1 hacking 1
more ... less ...
Online availability
All
Undetermined 4
Type of publication
All
Article 5 Book / Working Paper 1
Type of publication (narrower categories)
All
Article in journal 1 Aufsatz in Zeitschrift 1
Language
All
English 5 Undetermined 1
Author
All
Bucea Manea Tonis, Radu 1 Bukkawar, Mrunali 1 Funaseeli, N. 1 Haddad, Hisham 1 Mala, D. Jeya 1 Pathan, Mohd. Shafi 1 Shahriar, Hossain 1 Sheykhkanloo, Naghmeh Moradpoor 1 Yan, Wei Qi 1 Zhu, Alex 1
more ... less ...
Institution
All
Facultatea de Finante şi Banci, Universitatea Spiru Haret 1
Published in...
All
International Journal of Cyber Warfare and Terrorism (IJCWT) 1 International Journal of Digital Crime and Forensics (IJDCF) 1 International Journal of Secure Software Engineering (IJSSE) 1 International Journal of Synthetic Emotions (IJSE) 1 International journal of information systems and change management : IJISCM 1 Papers / Facultatea de Finante şi Banci, Universitatea Spiru Haret 1
Source
All
Other ZBW resources 4 ECONIS (ZBW) 1 RePEc 1
Showing 1 - 6 of 6
Cover Image
A Learning-based Neural Network Model for the Detection and Classification of SQL Injection Attacks
Sheykhkanloo, Naghmeh Moradpoor - In: International Journal of Cyber Warfare and Terrorism (IJCWT) 7 (2017) 2, pp. 16-41
Structured Query Language injection (SQLi) attack is a code injection technique where hackers inject SQL commands into a database via a vulnerable web application. Injected SQL commands can modify the back-end SQL database and thus compromise the security of a web application. In the previous...
Persistent link: https://www.econbiz.de/10012043885
Saved in:
Cover Image
Exploring Defense of SQL Injection Attack in Penetration Testing
Zhu, Alex; Yan, Wei Qi - In: International Journal of Digital Crime and Forensics (IJDCF) 9 (2017) 4, pp. 62-71
SQLIA is adopted to attack websites with and without confidential information. Hackers utilized the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enlarging the scale of Distributed Denial of Service Attack (DDoS). The DDoS is...
Persistent link: https://www.econbiz.de/10012043955
Saved in:
Cover Image
Web-Proxy-Based Authentication and Authorization Mechanism Against Client-Based HTTP Attacks
Pathan, Mohd. Shafi; Bukkawar, Mrunali - In: International Journal of Synthetic Emotions (IJSE) 8 (2017) 1, pp. 60-72
There has been a huge development in how to read a data from sensor device such as infrared (IR) device, temperature device, etc. Sensor data collection has wide issues of information security. Information security is also the current topic of discussion due to its use in application in various...
Persistent link: https://www.econbiz.de/10012047569
Saved in:
Cover Image
Securing web applications from SQLIA using progressive detector
Funaseeli, N.; Mala, D. Jeya - In: International journal of information systems and change … 9 (2017) 1, pp. 44-69
Persistent link: https://www.econbiz.de/10011850380
Saved in:
Cover Image
Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications
Shahriar, Hossain; Haddad, Hisham - In: International Journal of Secure Software Engineering (IJSSE) 7 (2016) 2, pp. 1-18
This paper addresses the problem of assessing risk in web application due to implementation level vulnerabilities. In particular, the authors address the common research challenge of finding enough historical data to compute the probability of vulnerabilities and exploitations. They develop a...
Persistent link: https://www.econbiz.de/10012048071
Saved in:
Cover Image
INTERNET SECURITY
Bucea Manea Tonis, Radu - Facultatea de Finante şi Banci, Universitatea Spiru Haret - 2009
describes configuration techniques for safe use of the PHP language and ends with an example code to counter attacks of SQL … Injection. …
Persistent link: https://www.econbiz.de/10004983364
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...