Login / Signup
Understanding Query Vulnerabilities for Various SQL Injection Techniques.
U. Chandrasekhar
Digvijay Singh
Published in:
ICACNI (2013)
Keyphrases
</>
security vulnerabilities
sql injection
database
query processing
sql injection attacks
data sources
web applications
range queries
information security
information systems
data warehouse
computer systems