Login / Signup

Understanding Query Vulnerabilities for Various SQL Injection Techniques.

U. ChandrasekharDigvijay Singh
Published in: ICACNI (2013)
Keyphrases
  • security vulnerabilities
  • sql injection
  • database
  • query processing
  • sql injection attacks
  • data sources
  • web applications
  • range queries
  • information security
  • information systems
  • data warehouse
  • computer systems