2014
DOI: 10.14445/22315381/ijett-v9p302
|View full text |Cite
|
Sign up to set email alerts
|

Various Database Attacks and its Prevention Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2025
2025

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…It notifies a central management console. NIDS is deployed at strategic locations in the network system infrastructure (outside the firewall, especially in areas like the Demilitarized Zone, DMZ) to control traffic flow and compare known attack types against a database [5].…”
Section: Introductionmentioning
confidence: 99%
“…It notifies a central management console. NIDS is deployed at strategic locations in the network system infrastructure (outside the firewall, especially in areas like the Demilitarized Zone, DMZ) to control traffic flow and compare known attack types against a database [5].…”
Section: Introductionmentioning
confidence: 99%