Login / Signup
Design considerations for a honeypot for SQL injection Attacks.
Thomas M. Chen
John F. Buford
Published in:
LCN (2009)
Keyphrases
</>
design considerations
sql injection attacks
web applications
sql injection
end users
pedagogical agents
random access memory
web services
database
data mining
third party