[PDF][PDF] A hybrid technique for SQL injection attacks detection and prevention

JO Atoum, AJ Qaralleh - International Journal of Database Management …, 2014 - Citeseer
ABSTRACT SQL injection is a type of attacks used to gain, manipulate, or delete information
in any data-driven system whether this system is online or offline and whether this system is …

[PDF][PDF] Detecting and defeating SQL injection attacks

S Roy, AK Singh, AS Sairam - International Journal of Information …, 2011 - researchgate.net
The increasing dependence on web applications have made them a natural target for
attackers. Among these attacks SQL Injection Attacks (SQLIA) are the most prevalent. In this …

Improving database security in web-based environments

F Di Tria, E Lefons, F Tangorra - International Conference on …, 2016 - scitepress.org
In web applications, databases are generally used as data repositories, where a server-side
program interacts with a Database Management System (DBMS), retrieves content, and …

[PDF][PDF] Social and business intelligence analysis using PSO

J Chaturvedi, A Parashar, AA Manjrekar… - arXiv preprint arXiv …, 2014 - researchgate.net
The goal of this paper is to elaborate swarm intelligence for business intelligence decision
making and the business rules management improvement. The paper introduces the …

Research on SQL performance optimization of CRM Stored Procedure

R Wang, N Wang - Applied Mechanics and Materials, 2014 - Trans Tech Publ
Research on SQL Performance Optimization of CRM Stored Procedure Page 1 Research on SQL
performance optimization of CRM stored procedure Wang Rui 1, a , Wang Na 2,b 1Department …

Research on technology of CRM stored procedure

R Wang, N Wang - Applied Mechanics and Materials, 2014 - Trans Tech Publ
Research on Technology of CRM Stored Procedure Page 1 Research on technology of
CRM stored procedure Wang Rui1, a, Wang Na2,b 1Department of Information Engineering …

[引用][C] New Approach to Detect and Prevent SQL Injection Attacks

AJ Qaralleh, J Al-Atoum - 2013 - Princess Sumaya University for …

[引用][C] Research on technology of CRM stored procedure.

W Rui, W Na - Applied Mechanics & Materials, 2014

[引用][C] SQL Injection Prevention Using Runtime Query Modeling And Keyword Randomization

S Raikar - 2013 - Rochester Institute of Technology