Login / Signup
Detection Method of the Second-Order SQL Injection in Web Applications.
Lu Yan
Xiaohong Li
Ruitao Feng
Zhiyong Feng
Jing Hu
Published in:
SOFL+MSVL (2013)
Keyphrases
</>
detection method
web applications
sql injection attacks
sql injection
injection attacks
detection algorithm
face detection
application development
end users
web services
web application development
region detection
software systems
mashup
countermeasures
open source
wireless sensor networks
video sequences