A survey of NewSQL DBMSs focusing on taxonomy, comparison and open issues
Advancements in internet, cloud, and business intelligence technologies, as well as the emergence of big data, have caused massive traffic in online transaction processing (OLTP) systems.All these impose the needs for effective and efficient data storage and processing which is not available in conv...
| Main Authors: | Abdullah, Muhammed, Abdullah, Zul Hilmi, Ismail, Waidah, Aldailamy, Ali Y., Radman, Abduljalil, Hendradi, Rimuljo, Afandi, Radhi Rafiee |
|---|---|
| Format: | Article |
| Published: |
SANDKRS
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/96124/ |
Similar Items
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
An optimal data access framework for telerehabilitation system
by: Muhammed, Abdullah, et al.
Published: (2021)
by: Muhammed, Abdullah, et al.
Published: (2021)
Comparative study for load management of HBase and Cassandra distributed databases in big data
by: Al-Dailamy, Ali Y., et al.
Published: (2018)
by: Al-Dailamy, Ali Y., et al.
Published: (2018)
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
Performance comparison between NoSQL (RethinkDB) and MySQL database replication from master to slave in big data
by: Dildar Hussain,, et al.
Published: (2021)
by: Dildar Hussain,, et al.
Published: (2021)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
Efficient multi-cloud storage using online dynamic replication and placement algorithms for online social networks
by: Aldailamy, Ali Y., et al.
Published: (2024)
by: Aldailamy, Ali Y., et al.
Published: (2024)
Online dynamic replication and placement algorithms for cost optimization of online social networks in two-tier multi-cloud
by: Aldailamy, Ali Y., et al.
Published: (2024)
by: Aldailamy, Ali Y., et al.
Published: (2024)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Crisis informatics in the context of social media crisis communication: theoretical models, taxonomy, and open issues
by: Bukar, Umar Ali, et al.
Published: (2020)
by: Bukar, Umar Ali, et al.
Published: (2020)
A study on microsoft SQL server 2000 / Ireen Munira Ibrahim
by: Ibrahim, Ireen Munira
Published: (2003)
by: Ibrahim, Ireen Munira
Published: (2003)
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Taxonomy of subfamilies Melolonthinae and Rutelinae in Malaysia
by: Ameen Abdullah, Ali Mohammad
Published: (2016)
by: Ameen Abdullah, Ali Mohammad
Published: (2016)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Restaurant O SIX JOINT online ordering system with anti-SQL injection
by: Tang, Jie Yi, et al.
Published: (2021)
by: Tang, Jie Yi, et al.
Published: (2021)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
The Taxonomy Of CSR In India
by: Kapoor, Anurag
Published: (2003)
by: Kapoor, Anurag
Published: (2003)
Focus IT Open day, 08 Februari 2012
by: New Sarawak, Tribune
Published: (2012)
by: New Sarawak, Tribune
Published: (2012)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Data Mining in Supplier Selection: A Practical Application Using Microsoft SQL Server 2005
by: Sunarya, Rajasa Utama
Published: (2008)
by: Sunarya, Rajasa Utama
Published: (2008)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
Bloom taxonomy revisited: analysis from western and Islamic perspectives
by: Abdullah, Norillah
Published: (2014)
by: Abdullah, Norillah
Published: (2014)
Integrative Taxonomy Of The Genus Barbodes (Cyprinidae)
In Peninsular Malaysia With A Focus On The B. Binotatus Species Complex And B. Lateristriga Morphotypes
by: Sobri, Noor Zahidah Ahmad
Published: (2023)
by: Sobri, Noor Zahidah Ahmad
Published: (2023)
Plant taxonomy in Malaysia: an appraisal
by: Latiff A.,
Published: (2016)
by: Latiff A.,
Published: (2016)
Taxonomy of stingless bee in Malaysia
by: Md Subahai, Nazatul Syafiqah
Published: (2016)
by: Md Subahai, Nazatul Syafiqah
Published: (2016)
Using algorithmic taxonomy to evaluate lecturer workload
by: Hashim, Ruhil Hayati, et al.
Published: (2006)
by: Hashim, Ruhil Hayati, et al.
Published: (2006)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Novel Endorna-like viruses, including three with two open reading frames, challenge the membership criteria and taxonomy of the Endornaviridae
by: Ong, J., et al.
Published: (2016)
by: Ong, J., et al.
Published: (2016)
A systematic review on cardiovascular stent and stenting failure: coherent taxonomy, performance measures, motivations, open challenges and recommendations
by: Kareem, A. K., et al.
Published: (2022)
by: Kareem, A. K., et al.
Published: (2022)
Similar Items
-
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023) -
An optimal data access framework for telerehabilitation system
by: Muhammed, Abdullah, et al.
Published: (2021) -
Comparative study for load management of HBase and Cassandra distributed databases in big data
by: Al-Dailamy, Ali Y., et al.
Published: (2018) -
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015) -
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)