Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities.
Ben H. SmithLaurie A. WilliamsPublished in: ICST (2011)
Keyphrases
- web applications
- application development
- web services
- application developers
- web browser
- database
- relational databases
- databases
- learning rails
- database management
- end users
- query language
- web application development
- business applications
- sql injection
- flow diagram
- database design
- software architecture
- sql server
- information security
- website
- information systems
- artificial intelligence