Effectiveness of structured query language injection attacks detection mechanisms
Database security is one of the most essential factors in keeping stored information safe. These days, web applications are used widely as a meddler between computer users. Web applications are also used mostly by e-commerce companies, and these types of applications need a secured database in order...
| Main Author: | Mohamad, Nurul Zawiyah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/9510/ http://eprints.utm.my/9510/1/NurulZawiyahMohamadMFSKSM2008.pdf |
Similar Items
Spatio-temporal data model and query language for biodiversity data
by: Wahid, Mohd. Taib, et al.
Published: (2005)
by: Wahid, Mohd. Taib, et al.
Published: (2005)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Sensual Semantic Analysis for Effective Query Expansion
by: Raza, Muhammad Ahsan, et al.
Published: (2018)
by: Raza, Muhammad Ahsan, et al.
Published: (2018)
Query routing using query feedback and similarity in unstructured peer to peer networks
by: Ishak, Iskandar, et al.
Published: (2008)
by: Ishak, Iskandar, et al.
Published: (2008)
Modeling and querying alternative paths in Kuantan
by: Mohamad Salleh, Mazlina
Published: (2007)
by: Mohamad Salleh, Mazlina
Published: (2007)
A free-form database query language for mobile phones
by: R., Ahmad, et al.
Published: (2009)
by: R., Ahmad, et al.
Published: (2009)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Remote to Local Attack Detection Using Supervised Neural Network
by: Iftikhar, Ahmad, et al.
Published: (2010)
by: Iftikhar, Ahmad, et al.
Published: (2010)
User interest driven semantic query expansion for effective web search
by: Raza, Muhammad Ahsan, et al.
Published: (2021)
by: Raza, Muhammad Ahsan, et al.
Published: (2021)
A survey of statistical approaches for query expansion
by: Raza, Muhammad Ahsan, et al.
Published: (2018)
by: Raza, Muhammad Ahsan, et al.
Published: (2018)
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012)
by: Khanam, Shapla, et al.
Published: (2012)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Data mining techniques for effective detection of distributed denial-of-service attacks
by: Lee, Yuen Hui
Published: (2024)
by: Lee, Yuen Hui
Published: (2024)
Reporting skyline on uncertain dimension with query interval
by: Mohd Saad, Nurul Husna, et al.
Published: (2016)
by: Mohd Saad, Nurul Husna, et al.
Published: (2016)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
Query Expansion Using Conceptual Knowledge in Computer Science
by: Raza, Muhammad Ahsan, et al.
Published: (2018)
by: Raza, Muhammad Ahsan, et al.
Published: (2018)
A taxonomy and survey of semantic approaches for query expansion
by: Raza, Muhammad Ahsan, et al.
Published: (2019)
by: Raza, Muhammad Ahsan, et al.
Published: (2019)
A flexible query transformation framework for structured retrieval / Gan Keng Hoon
by: Gan, Keng Hoon
Published: (2013)
by: Gan, Keng Hoon
Published: (2013)
A knowledge-based approach to facilitate queries by hajj pilgrims
by: Sulaiman, Sarina, et al.
Published: (2008)
by: Sulaiman, Sarina, et al.
Published: (2008)
A knowledge-based approach to facilitate queries by hajj pilgrims
by: Sulaiman, Shahida, et al.
Published: (2008)
by: Sulaiman, Shahida, et al.
Published: (2008)
Evaluation of XML documents queries based on native XML database
by: Lazim, Raghad Yaseen
Published: (2016)
by: Lazim, Raghad Yaseen
Published: (2016)
E. Help Desk: A natural language processing for answering query / Norwin Shariman Mohd. Nor
by: Norwin Shariman, Mohd. Nor
Published: (2001)
by: Norwin Shariman, Mohd. Nor
Published: (2001)
SCSA: Evaluating skyline queries in incomplete data
by: Gulzar, Yonis, et al.
Published: (2019)
by: Gulzar, Yonis, et al.
Published: (2019)
Optimizing skyline query processing in incomplete data
by: Gulzar, Yonis, et al.
Published: (2019)
by: Gulzar, Yonis, et al.
Published: (2019)
An efficient DDoS attack detection framework for vehicular communication / Raenu Kolandaisamy
by: Raenu , Kolandaisamy
Published: (2020)
by: Raenu , Kolandaisamy
Published: (2020)
IDS for Improving DDoS attack recognition based on attack profiles and network traffic features
by: Sallam, Amer A., et al.
Published: (2020)
by: Sallam, Amer A., et al.
Published: (2020)
Image manipulations analysis and detection methods for reflection-based attacks / Nor Bakiah Abd. Warif
by: Nor Bakiah, Abd. Warif
Published: (2018)
by: Nor Bakiah, Abd. Warif
Published: (2018)
Detection of distributed denial-of-service (DDoS) attack with hyperparameter tuning based on machine learning approach
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2023)
Detection Of Distributed Denial-Of-Service (Ddos) Attack With Hyperparameter Tuning Based On Machine Learning Approach
by: Choo, Yong Han
Published: (2023)
by: Choo, Yong Han
Published: (2023)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
A universal relation approach for natural query in logic database system
by: Selamat, Harihodin
Published: (1992)
by: Selamat, Harihodin
Published: (1992)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
Similar Items
-
Spatio-temporal data model and query language for biodiversity data
by: Wahid, Mohd. Taib, et al.
Published: (2005) -
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002) -
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013) -
Sensual Semantic Analysis for Effective Query Expansion
by: Raza, Muhammad Ahsan, et al.
Published: (2018) -
Query routing using query feedback and similarity in unstructured peer to peer networks
by: Ishak, Iskandar, et al.
Published: (2008)