-
1
-
-
80455148465
-
RFID Essentials
-
O'Reilly Media, Sebastopol
-
Glover, B., Bhatt, H.: RFID Essentials. Theory in Practice. O'Reilly Media, Sebastopol (2006)
-
(2006)
Theory in Practice
-
-
Glover, B.1
Bhatt, H.2
-
2
-
-
33749663423
-
RFID malware: Design principles and examples
-
Rieback, M., Simpson, P., Crispo, B., Tanenbaum, A.: RFID malware: Design principles and examples. Pervasive and Mobile Computing 2(4), 405-426 (2006)
-
(2006)
Pervasive and Mobile Computing
, vol.2
, Issue.4
, pp. 405-426
-
-
Rieback, M.1
Simpson, P.2
Crispo, B.3
Tanenbaum, A.4
-
3
-
-
77950319934
-
A survey of SQL injection defense mechanisms
-
IEEE, London
-
Amirtahmasebi, K., Jalalinia, S.R., Khadem, S.: A survey of SQL injection defense mechanisms. In: 6th International Conference for Internet Technology and Secured Transactions. IEEE, London (2009)
-
(2009)
6th International Conference for Internet Technology and Secured Transactions
-
-
Amirtahmasebi, K.1
Jalalinia, S.R.2
Khadem, S.3
-
4
-
-
78649806181
-
Evaluation of SQL Injection Detection and Prevention Techniques
-
IEEE, Liverpool
-
Tajpour, A., Zade Shooshtari, M.J.J.: Evaluation of SQL Injection Detection and Prevention Techniques. In: 2nd International Conference on Computational Intelligence, Communication Systems and Networks, pp. 216-221. IEEE, Liverpool (2010)
-
(2010)
2nd International Conference on Computational Intelligence, Communication Systems and Networks
, pp. 216-221
-
-
Tajpour, A.1
Zade Shooshtari, M.J.J.2
-
6
-
-
84880450431
-
Web application security assessment by fault injection and behavior monitoring
-
ACM, Honolulu
-
Huang, Y.W., Huang, S.K., Lin, T.P., Tsai, C.H.: Web application security assessment by fault injection and behavior monitoring. In: 11th International World Wide Web Conference. ACM, Honolulu (2003)
-
(2003)
11th International World Wide Web Conference
-
-
Huang, Y.W.1
Huang, S.K.2
Lin, T.P.3
Tsai, C.H.4
-
8
-
-
35048851186
-
SQLrand: Preventing SQL injection attacks
-
Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. Springer, Heidelberg
-
Boyd, S.W., Keromytis, A.D.: SQLrand: Preventing SQL injection attacks. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 292-302. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3089
, pp. 292-302
-
-
Boyd, S.W.1
Keromytis, A.D.2
-
12
-
-
80455151078
-
-
IEEE, Los Alamitos
-
Suliman, A., Shankarapani, M., Mukkamala, S., Sung, A.: RFID malware fragmentation attacks. IEEE, Los Alamitos (2008)
-
(2008)
RFID Malware Fragmentation Attacks
-
-
Suliman, A.1
Shankarapani, M.2
Mukkamala, S.3
Sung, A.4
-
13
-
-
84857951368
-
An Approach to Detection of SQL Injection Vulnerabilities Based on Dynamic Query Matching
-
Das, D., Sharma, U., Bhattacharyya, D.: An Approach to Detection of SQL Injection Vulnerabilities Based on Dynamic Query Matching. International Journal of Computer Applications IJCA 1(25), 39-45 (2010)
-
(2010)
International Journal of Computer Applications IJCA
, vol.1
, Issue.25
, pp. 39-45
-
-
Das, D.1
Sharma, U.2
Bhattacharyya, D.3
-
14
-
-
77953855187
-
Using parse tree validation to prevent SQL injection attacks
-
ACM, New York
-
Buehrer, G., Weide, B.W., Sivilotti, P.A.G.: Using parse tree validation to prevent SQL injection attacks. In: International Conference on Software Engineering and Middleware. ACM, New York (2005)
-
(2005)
International Conference on Software Engineering and Middleware
-
-
Buehrer, G.1
Weide, B.W.2
Sivilotti, P.A.G.3
|