Login / Signup

Correlation Approach for SQL Injection Attacks Detection.

Michal ChorasRafal KozikDamian PuchalskiWitold Holubowicz
Published in: CISIS/ICEUTE/SOCO Special Sessions (2012)
Keyphrases
  • object detection
  • real time
  • anomaly detection
  • detection algorithm
  • databases
  • expert systems
  • end users
  • unsupervised learning
  • false positives