Login / Signup

Effective SQL Injection Attack Reconstruction Using Network Recording.

Allen PomeroyQing Tan
Published in: CIT (2011)
Keyphrases
  • computer networks
  • information systems
  • network structure
  • security vulnerabilities
  • sql injection
  • injection attacks
  • database systems
  • wireless sensor networks
  • peer to peer
  • network traffic
  • mobile networks