2012
DOI: 10.1016/j.proeng.2012.01.850
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Technique for Detection and Prevention of SQL Injection Attack using ASCII Based String Matching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
1

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 2 publications
0
9
0
1
Order By: Relevance
“…validated) with all the mentioned steps, and the result shows if the information is safe or not. Balasundaram [1] mentions two more methods for the purpose of the detection and prevention of SQL injection attacks, a web service technique in [10] and an ASCII based string matching approach in [11].…”
Section: Related Workmentioning
confidence: 99%
“…validated) with all the mentioned steps, and the result shows if the information is safe or not. Balasundaram [1] mentions two more methods for the purpose of the detection and prevention of SQL injection attacks, a web service technique in [10] and an ASCII based string matching approach in [11].…”
Section: Related Workmentioning
confidence: 99%
“…For our mapping study, we followed the guidelines provided in [7,8]. Accordingly, our mapping study was conducted in three stages.…”
Section: The Systematic Mapping Proceduresmentioning
confidence: 99%
“…enterprise security application programming interface whose purpose is incorporating security into existing and new WBs. Finally, researchers have broad consensus over OWASP top 10 regarding the main critical security vulnerabilities of WBs [3,4,7,8,11,12,13,14,17].…”
Section: Introductionmentioning
confidence: 99%
“…String matching problems involve finding all occurrences of a given short-pattern query on a relatively long reference string. This problem has a number of applications, such as computer security [1], word recognition [2], data mining [3]- [5], and biological sequence processing [6]. Many theoretical solutions have been presented (including exact string matching algorithms [7], and approximate string matching algorithms [8]).…”
Section: Introductionmentioning
confidence: 99%