Login / Signup

MAC based solution for SQL injection.

Diksha Gautam KumarMadhumita Chatterjee
Published in: J. Comput. Virol. Hacking Tech. (2015)
Keyphrases
  • real time
  • data mining
  • low cost
  • e government
  • intrusion detection