2021
DOI: 10.1080/19393555.2021.1995537
|View full text |Cite
|
Sign up to set email alerts
|

A systematic review of detection and prevention techniques of SQL injection attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(18 citation statements)
references
References 66 publications
0
4
0
Order By: Relevance
“…Figure 3 illustrates the CNN-LSTM algorithm paradigm, and the particular stages are as follows: Mathematical Problems in Engineering 3 (a) Spark offers a consistent and comprehensive framework for handling diverse datasets and data sources (batch or real-time streaming data) with varying characteristics (text data, chart data, etc.) [38,39]. (b) Spark improves the performance of Hadoop cluster apps operating in memory by 100 times and the speed of Hadoop cluster applications running on the disc by ten times [14,40].…”
Section: Cnn-lstm Algorithmmentioning
confidence: 99%
“…Figure 3 illustrates the CNN-LSTM algorithm paradigm, and the particular stages are as follows: Mathematical Problems in Engineering 3 (a) Spark offers a consistent and comprehensive framework for handling diverse datasets and data sources (batch or real-time streaming data) with varying characteristics (text data, chart data, etc.) [38,39]. (b) Spark improves the performance of Hadoop cluster apps operating in memory by 100 times and the speed of Hadoop cluster applications running on the disc by ten times [14,40].…”
Section: Cnn-lstm Algorithmmentioning
confidence: 99%
“…Dynamic detection is capable of identifying vulnerabilities that are predefined by application developers. However, due to the assorted syntax of malicious statements, it fails to meet the detection requirements in intricate systems [13].…”
Section: Introductionmentioning
confidence: 99%
“…S QL injection attacks are a prevalent and serious security threat in web applications and databases [1]. The attacker exploits vulnerabilities in software systems that interact with databases through SQL injection.…”
Section: Introductionmentioning
confidence: 99%