• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Understanding Query Vulnerabilities for Various SQL Injection Techniques.

U. ChandrasekharDigvijay Singh
Published in: ICACNI (2013)
Keyphrases
  • security vulnerabilities
  • sql injection
  • database
  • query processing
  • sql injection attacks
  • data sources
  • web applications
  • range queries
  • information security
  • information systems
  • data warehouse
  • computer systems