暂无分享,去创建一个
[1] Bruce W. Weide,et al. Using parse tree validation to prevent SQL injection attacks , 2005, SEM '05.
[2] Elisa Bertino,et al. Mechanisms for database intrusion detection and response , 2008, IDAR '08.
[3] Elisa Bertino,et al. Profiling Database Application to Detect SQL Injection Attacks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[4] K. Marimuthu,et al. An efficient technique for preventing SQL injection attack using pattern matching algorithm , 2013, 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN).
[5] Elisa Bertino,et al. Intrusion detection in RBAC-administered databases , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[6] David Cornforth,et al. An overview of recent advances in intrusion detection , 2008, 2008 8th IEEE International Conference on Computer and Information Technology.
[7] Alessandro Orso,et al. WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation , 2008, IEEE Transactions on Software Engineering.
[8] V. N. Venkatakrishnan,et al. CANDID: preventing sql injection attacks using dynamic candidate evaluations , 2007, CCS '07.
[9] Amit Kumar Pandey. Securing Web Applications From Application-Level Attack , 2007 .
[10] Stefan Axelsson,et al. Intrusion Detection Systems: A Survey and Taxonomy , 2002 .
[11] Joseph Lee,et al. DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions , 2002, ICEIS.
[12] Christie I. Ezeife,et al. SensorWebIDS: a web mining intrusion detection system , 2008, Int. J. Web Inf. Syst..
[13] S.F. Yusufovna,et al. Integrating Intrusion Detection System and Data Mining , 2008, 2008 International Symposium on Ubiquitous Multimedia Computing.
[14] Elisa Bertino,et al. Detecting anomalous access patterns in relational databases , 2008, The VLDB Journal.
[15] Alessandro Orso,et al. AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks , 2005, ASE.