TY - STD TI - Acunetix_web_application_vulnerability_report_2019 ID - ref1 ER - TY - JOUR AU - Soewito, B. AU - Gunawan, F. E. PY - 2018 DA - 2018// TI - Prevention structured query language injection using regular regular expression and escape string JO - Procedia Comput. Sci. VL - 135 UR - https://doi.org/10.1016/j.procs.2018.08.218 DO - 10.1016/j.procs.2018.08.218 ID - Soewito2018 ER - TY - JOUR AU - Ahmed, M. A. AU - Ali, F. PY - 2015 DA - 2015// TI - Multiple-path testing for cross site scripting using genetic algorithms JO - J. Syst. Archit. VL - 000 ID - Ahmed2015 ER - TY - STD TI - Y. Jang, J. Choi, Detecting SQL injection attacks using query result size. Comput Security, 1–15 (2014) https://doi.org/10.1016/j.cose.2014.04.007 ID - ref4 ER - TY - JOUR AU - Mcwhirter, P. R. AU - Kifayat, K. AU - Shi, Q. AU - Askwith, B. PY - 2018 DA - 2018// TI - SQL injection attack classification through the feature extraction of SQL query strings using a gap-weighted string subsequence kernel JO - J. Inform. Sec. Appl. VL - 40 ID - Mcwhirter2018 ER - TY - STD TI - O.C. Abikoye, A.D. Haruna, A. Abubakar, N.O. Akande, E.O. Asani, Modified advanced encryption standard algorithm for information security. Symmetry 11, 1–17 (2019) https://doi.org/10.3390/sym11121484 ID - ref6 ER - TY - STD TI - N.O. Akande, C.O. Abikoye, M.O. Adebiyi, A.A. Kayode, A.A. Adegun, R.O. Ogundokun, in International Conference on Computational Science and Its Applications. Electronic medical information encryption using modified blowfish algorithm (Springer, Cham, 2019), pp. 166–179 https://doi.org/10.1007/978-3-030-24308-1_14 ID - ref7 ER - TY - STD TI - A.O. Christiana, A.N. Oluwatobi, G.A. Victory, O.R. Oluwaseun, A Secured One Time Password Authentication Technique using (3, 3) Visual Cryptography Scheme. IOP Conf. Series: Journal of Physics: Conf. Series 1299, 1–10 (2019 https://doi.org/10.1088/1742-6596/1299/1/012059) ID - ref8 ER - TY - JOUR AU - Temeiza, Q. AU - Temeiza, M. AU - Itmazi, J. PY - 2017 DA - 2017// TI - A novel method for preventing SQL injection using SHA-1 algorithm and syntax-awareness JO - Sudanese J. Comput. Geoinform. VL - 1 ID - Temeiza2017 ER - TY - BOOK AU - Buja, G. AU - Abdul, T. F. AU - Kamarularifin, B. A. J. AU - Fakariah, M. A. AU - Abdul-Rahman, T. F. PY - 2014 DA - 2014// TI - Detection model for SQL injection attack : an approach for preventing a web application from the SQL injection attack ID - Buja2014 ER - TY - BOOK AU - Piyush, A. S. AU - Mhetre, A. N. PY - 2015 DA - 2015// TI - International Conference on Pervasive Computing (ICPC). A novel approach for detection of SQL injection and cross site scripting attacks ID - Piyush2015 ER - TY - BOOK AU - Ping, C. AU - Jinshuang, W. AU - Lin, P. AU - Han, Y. PY - 2016 DA - 2016// TI - Research and implementation of SQL injection prevention method based on ISR ID - Ping2016 ER - TY - BOOK AU - Upadhyay, U. AU - Girish, K. PY - 2016 DA - 2016// TI - SQL injection avoidance for protected database with ASCII using SNORT and honeypot ID - Upadhyay2016 ER - TY - BOOK AU - Appiah, B. AU - Opoku-mensah, E. PY - 2017 DA - 2017// TI - SQL injection attack detection using fingerprints and pattern matching technique ID - Appiah2017 ER - TY - BOOK AU - Ping, C. PY - 2017 DA - 2017// TI - A second-order SQL injection detection method ID - Ping2017 ER - TY - BOOK AU - John, A. AU - Agarwal, A. AU - Bhardwaj, M. PY - 2015 DA - 2015// TI - An adaptive algorithm to prevent SQL injection. 4 ID - John2015 ER - TY - BOOK AU - Ramesh, A. PY - 2015 DA - 2015// TI - An Authentication Mechanism to Prevent SQL Injection by Syntactic Analysis UR - https://doi.org/10.1109/ITACT.2015.7492650 DO - 10.1109/ITACT.2015.7492650 ID - Ramesh2015 ER - TY - BOOK AU - Karis, D. AU - Vanajakshi, J. AU - Manjunath, K. N. AU - Srikanth, P. PY - 2017 DA - 2017// TI - An effective method for preventing SQL injection attack and session hijacking ID - Karis2017 ER - TY - BOOK AU - Pramod, A. AU - Ghosh, A. AU - Mohan, A. AU - Shrivastava, M. AU - Shettar, R. PY - 2015 DA - 2015// TI - SQLI detection system for a safer web application ID - Pramod2015 ER - TY - BOOK AU - Voitovych, O. P. AU - Yuvkovetskyi, O. S. AU - Kupershtein, L. M. PY - 2016 DA - 2016// TI - SQL injection prevention system ID - Voitovych2016 ER - TY - BOOK AU - Chen, P. AU - Wang, J. AU - Pan, L. AU - Yu, H. PY - 2016 DA - 2016// TI - Research and implementation of SQL injection prevention method based on ISR PB - IEEE CY - Chengdu ID - Chen2016 ER - TY - STD TI - G. Ahmad, A hybrid method for detection and prevention of SQL injection attacks, Computing Conference (London, 2017), pp. 833–838 ID - ref22 ER - TY - BOOK AU - Amith, P. AU - Agneev, G. AU - Amal, M. AU - Mohit, S. AU - Rajashree, S. PY - 2015 DA - 2015// TI - SQLI detection system for a safer web application PB - IEEE CY - Banglore ID - Amith2015 ER - TY - BOOK AU - Ashwin, R. AU - Anirban, B. AU - Anand, V. L. PY - 2015 DA - 2015// TI - An authentication mechanism to prevent SQL injection by syntactic analysis PB - IEEE CY - Bangalore ID - Ashwin2015 ER - TY - BOOK AU - Prabakar, A. AU - KarthiKeyan, M. AU - Marimuthu, K. PY - 2013 DA - 2013// TI - An efficient technique for preventing SQL injection attack using pattern ID - Prabakar2013 ER - TY - BOOK AU - Ghafarian, A. PY - 2017 DA - 2017// TI - A hybrid method for detection and prevention of SQL injection attacks ID - Ghafarian2017 ER - TY - BOOK AU - Amutha, P. AU - KarthiKeyan, M. AU - Marimuthu, K. PY - 2013 DA - 2013// TI - An efficient technique for preventing SQL injection attack using pattern matching algorithm ID - Amutha2013 ER - TY - BOOK AU - Qais, T. AU - Mohammad, T. AU - Jamil, I. PY - 2017 DA - 2017// TI - A novel method for preventing SQL injection using SHA-1 algorithm and syntax-awareness PB - IEEE CY - Khartoum ID - Qais2017 ER - TY - BOOK AU - Utpal, U. AU - Girish, K. PY - 2016 DA - 2016// TI - SQL injection avoidance for protected database with ASCII using SNORT and honeypot. International conference on advanced communication control and Computing technologies (ICACCCT) PB - IEEE CY - Ramanathapuram ID - Utpal2016 ER - TY - STD TI - J. Ashish, A. Ajay, B. Manish, An adaptive algorithm to prevent SQL injection. Am. J. Networks Commun., 12–15 (2015) ID - ref30 ER - TY - BOOK AU - Srivastava, M. PY - 2014 DA - 2014// TI - Algorithm to Prevent Back End Database against SQL Injection Attacks International Comference on Computing for Sustainable Global Development (INDIACom) ID - Srivastava2014 ER - TY - BOOK AU - Pravallica, T. AU - Betam, S. PY - 2013 DA - 2013// TI - An application to prevent SQL injection attacks using randomized encription algorithm. International journal of computer trends and technology (IJCTT) ID - Pravallica2013 ER - TY - BOOK AU - Geogiana, B. AU - Kamarularifin, B. A. AU - Fakariah, B. H. AU - Teh, F. A. PY - 2014 DA - 2014// TI - Detection model for SQL injection attack: an approach for preventing a web application from the SQL injection attack PB - IEEE CY - Penang ID - Geogiana2014 ER -