Login / Signup
Effective SQL Injection Attack Reconstruction Using Network Recording.
Allen Pomeroy
Qing Tan
Published in:
CIT (2011)
Keyphrases
</>
computer networks
information systems
network structure
security vulnerabilities
sql injection
injection attacks
database systems
wireless sensor networks
peer to peer
network traffic
mobile networks