1 |
JUSTIN CLARKE, "SQL Injection : Attacks and Defense", Elsevier Inc. 2009
|
2 |
Seong-Ho Choi, "Defense method against SQL injection attack by hacking tools", Graduate School of Information&Technology, Sogang University, 2010
|
3 |
M.Amutha Prabakar, M.KarthiKeyan, K. Marimuthu, "An Efficient Technique For Preventing SQL Injection Attack Using Pattern", IEEE Computer Society, 2013.5
|
4 |
In-Yong Lee, Jae-Ik Cho, Kyu-Hyung Cho, Jong-sub Moon, "A Method for SQL Injection Attack Detection using the Removal of SQL Query Attribute Values", Journal of The Korea Institute of Information Security and Cryptology Vol.18, No.5, pp.136-140, 2009.
|
5 |
Jeom-Goo Kim, Si-Choon Noh, "A Study of Step-by-step Countermeasures Model through Analysis of SQL Injection Attacks Code", Journal of information and security Vol.12, No.1, 2012
|
6 |
Lwin Khin Shar, Hee Beng Kuan Tan, "Defeating SQL Injection", IEEE Computer Society, 2013.3
|
7 |
Mun-Joo Lee, "A study on the intrusion detection and countermeasure system for mass SQL injection", Graduate School of Information, Chung-ang University, 2011
|
8 |
Debabrata Kar, Suvasini Panigrahi, "Prevention of SQL Injection Attack Using Query Transformation and Hashing", IEEE Computer Society, 2012.3
|
9 |
Joon-Seon Ahn, Yeong-Min Kim, Jang-Wu Jo, "Development of a String Injection Vulnerability Analyzer for Web Application Programs", The KIPS transactions. Part A. Vol.15-A, No.3, pp.181-182, 2008
|
10 |
Korea Information Security Agency, "Research on inserting malicious code through an automated SQL Injection Attack", 2008
|
11 |
Incheon Paik, "Improving Malicious Web Code Classification with Sequence by Machine Learning", IEIE Transactions on Smart Processing & Computing Vol.3 No.4, pp.319-324, 2014.10
DOI
|
12 |
Z. Lashkaripour, "A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks", International Journal of Security and Its Applications Vol.7, No.5, pp.53-66, 2013
DOI
|
13 |
F. Valeur, D. Mutz, G. Vigna, "A Learning-Based Approach to the Detection of SQL Attacks", In Proceedings of the Conference on Detection of Intrusious and Malware and Vulnerability Assessment, pp 123-140, 2005.
|
14 |
Huang.Y, Huang.S, Lin.T, Tasi.C, "Web application security assessment by fault injection and behavior monitoring", In Proceedings of the 12th international Conference on World Wide Web, pp.148-159, 2003
|
15 |
Ju-Hwa Park, "A study of the preventive measures to counteract the SQL injection attacks on the web programed in Java", Grauduate School of Sungkyunkwan University, 2010
|
16 |
Jong-Cheol Lee, "Oracle Query tuning method using a Hint", Graduate School of Technology Management, Kyunghee University, 2008
|
17 |
http://users.aber.ac.uk/pds7/csic_dataset/csic2010http.html
|
18 |
Young-Sun Kim, Choon-Weon Seo, "Design and Implimentation of Intrusion Detection System on Contents Security", Journal of The Institute of Electronics and Information Engineers Vol.52, No.11, pp.164-168, 2015
DOI
|
19 |
https://github.com/ron190/jsql-injection
|