Login / Signup

An Approach for SQL Injection Vulnerability Detection.

Junjin Mei
Published in: ITNG (2009)
Keyphrases
  • security vulnerabilities
  • real time
  • information systems
  • anomaly detection