A Zhu,
WQ Yan - International Journal of Digital Crime and Forensics …, 2017 - igi-global.com
SQLIA is adopted to attack websites with and without confidential information. Hackers
utilized the compromised website as intermediate proxy to attack others for avoiding being …