2020
DOI: 10.1587/transinf.2019edl8143
|View full text |Cite
|
Sign up to set email alerts
|

Detection of SQL Injection Vulnerability in Embedded SQL

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…On the other hand, while Ethereum also supports smart contracts and has been widely used in decentralized applications, it is a permissionless network, meaning that anyone can participate and access the data. This makes it less suitable for use in the context of intrusion detection, where privacy and security are of utmost importance [15]. Hyperledger Fabric's focus on security, privacy, and customization make it a more suitable choice for intrusion detection systems than Ethereum.…”
Section: Blockchain Technologymentioning
confidence: 99%
“…On the other hand, while Ethereum also supports smart contracts and has been widely used in decentralized applications, it is a permissionless network, meaning that anyone can participate and access the data. This makes it less suitable for use in the context of intrusion detection, where privacy and security are of utmost importance [15]. Hyperledger Fabric's focus on security, privacy, and customization make it a more suitable choice for intrusion detection systems than Ethereum.…”
Section: Blockchain Technologymentioning
confidence: 99%
“…If the grammar rules are not met, an error will be reported. If the grammar rules are met, the compilation will pass [11].…”
Section: Syntax Analysis Modulementioning
confidence: 99%