Diverse approaches have been presented to mitigate sql injection attack, but it is still alive: a review

M Qbea'h, S Alrabaee, M Alshraideh… - … on Computer and …, 2022 - ieeexplore.ieee.org
A huge amount of stored and transferred data is expanding rapidly. Therefore, managing
and securing the big volume of diverse applications should have a high priority. However …

[PDF][PDF] Enhancing SQL Injection Detection with Trustworthy Ensemble Learning and Boosting Models Using Local Explanation Techniques

DSC Putranto, H Kim - 2024 - preprints.org
This paper presents a comparative analysis of several decision models for detecting
Structured Query Language (SQL) injection attacks, which remain one of the most prevalent …

Web Vulnerability Scanner: Cybersecurity

M Sandberg, E Gunnarsson - 2024 - diva-portal.org
This Bachelor's thesis project explores the development and implementation of a web
vulnerability scanner crafted to detect SQL Injection and Cross Site Scripting vulnerabilities …

[引用][C] APPROACHES TO BUILD OF ADVANCED SECURE SCHEME FOR DATABASE MANAGEMENT SYSTEMS

ID Yakubjanovna, SD Jumanazarovna - International Journal of Contemporary …, 2022

[引用][C] A Deep Dive into Software Vulnerabilities: Trends, Impacts, and Remediation Techniques

Z Rajpoot, S Munnir - International Journal of Advanced Sciences and …, 2024