Injection attacks
Multidimensional Analysis Of Sql Injection Attacks In Web Application
7
Security Against Sql Injection Attacks Using Amnesia
6
Multi-hashing for Protecting Web Applications from SQL Injection Attacks
9
SIGNATURE BASED EVALUATION TO COUNTER AND PREVENT INJECTION ATTACKS
5
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
11
THE IMAGE LEVEL TAINTING: A NEW APPROACH FOR PREVENTING SQL INJECTION ATTACKS
7
Preventing SQL Injection Attacks Using Combinatorial Approach
7
Effectiveness of structured query language injection attacks detection mechanisms
15
A Review on Detection Mechanisms for SQL Injection Attacks
7
Detection of Fault-injection Attacks for Cryptographic Applications
7
Triple Phase Protection Technique to Prevent SQL Injection Attacks
10
Use of Query Tokenization to Detect and Prevent SQL Injection Attacks
7
CIDT: Detection of Malicious Code Injection Attacks on Web Application
8
A Survey on SQL Injection Attacks and Methods to Detect and Prevent Them
7
A Built In Self Test as a Countermeasure for Fault Injection Attacks on Cryptographic Devices
42
Detection and Automatic Prevention against SQL Injection Attacks and XSS Attacks perform on Web Applications
5
Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications
23
Runtime Monitoring Framework for SQL Injection Attacks
10
A Novel Approach of Preventing SQL Injection Attacks with the Use of Combinatorial Approach
9
Preventing SQL Injection Attacks
5