لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
تجلی پور، ب.، اصغر صفایی، ع.، تحلیل ساختاری و معنایی ...
OWASP Top 10 Application Security Risks – 2017. Available: https://www.owasp.org/index.php/Top_10_2017-Top_10 ...
K. V. P. R. Sheth, Survey on Prevention of Web ...
Z. Su and G. Wassermann, The Essence of Command Injection ...
W. G. Halfond, J. Viegas, and A. Orso, A classification ...
X. Fu, X. Lu, B. Peltsverger, S. Chen, K. Qian, ...
H. K. Kim, Frameworks for SQL Retrieval on Web Application ...
I. Lee, S. Jeong, S. Yeo, and J. Moon, A ...
W. G. Halfond and A. Orso, Preventing SQL injection attacks ...
J. Wang, R. C.-W. Phan, J. N. Whitley, and D. ...
A. Yeole and B. Meshram, Analysis of different technique for ...
Y. V. N. Manikanta and A. Sardana, Protecting web applications ...
A. Tajpour, M. Z. Heydari, M. Masrom, and S. Ibrahim, ...
J. Clarke-Salt, SQL injection attacks and defense, Elsevier, 2009. ...
D. Fraunholz, M. Zimmermann, and H. D. Schotten, An adaptive ...
C. Gould, Z. Su, and P. Devanbu, JDBC checker: A ...
V. B. Livshits and M. S. Lam, Finding Security Vulnerabilities ...
Y. Shin and L. A. Williams, Towards a taxonomy of ...
D. Scott and R. Sharp, Abstracting application-level web security, in ...
Y.-W. Huang, S.-K. Huang, T.-P. Lin, and C.-H. Tsai, Web ...
A. A. Alfantookh, An automated universal server level solution for ...
S. Boyd and A. Keromytis, SQLrand: Preventing SQL injection attacks, ...
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, ...
G. Wassermann and Z. Su, An analysis framework for security ...
G. Buehrer, B. W. Weide, and P. A. Sivilotti, Using ...
M. Sam and N. SQLBlock, SQL Injection Protection by Variable ...
V. Haldar, D. Chandra, and M. Franz, Dynamic taint propagation ...
W. G. Halfond and A. Orso, AMNESIA: analysis and monitoring ...
M. Martin, B. Livshits, and M. S. Lam, Finding application ...
I. Kruger and R. McClure, SQL DOM: compile time checking ...
F. Valeur, D. Mutz, and G. Vigna, A learning-based approach ...
N. Jovanovic, C. Kruegel, and E. Kirda, Pixy: A static ...
S. Kals, E. Kirda, C. Kruegel, and N. Jovanovic, Secubat: ...
J.-C. Lin and J.-M. Chen, An automatic revised tool for ...
M. Muthuprasanna, K. Wei, and S. Kothari, Eliminating SQL injection ...
T. Pietraszek and C. V. Berghe, Defending against injection attacks ...
Z. Su and G. Wassermann, The essence of command injection ...
K. Wei, M. Muthuprasanna, and S. Kothari, Preventing SQL injection ...
M. Cova, D. Balzarotti, V. Felmetsger, and G. Vigna, Swaddler: ...
J. Fonseca, M. Vieira, and H. Madeira, Detecting malicious SQL, ...
G. Hermosillo, R. Gomez, L. Seinturier, and L. Duchien, Using ...
M. Johns and C. Beyerlein, SMask: preventing injection attacks in ...
Y. Kosuga, K. Kono, M. Hanaoka, M. Hishiyama, and Y. ...
E. Merlo, D. Letarte, and G. Antoniol, Automated protection of ...
S. Thomas and L. Williams, Using automated fix generation to ...
F. Dysart and M. Sherriff, Automated fix generator for sql ...
X. Fu and K. Qian, SAFELI: SQL injection scanner using ...
W. Halfond, A. Orso, and P. Manolios, WASP: Protecting web ...
K. Kemalis and T. Tzouramanis, SQL-IDS: a specification-based approach for ...
M. Kiani, A. Clark, and G. Mohay, Evaluation of anomaly ...
J.-C. Lin, J.-M. Chen, and C.-H. Liu, An automatic mechanism ...
D. Mitropoulos and D. Spinellis, SDriver: Location-specific signatures prevent SQL ...
H. Shahriar and M. Zulkernine, MUSIC: Mutation-based SQL injection vulnerability ...
Z. Zhang, Q. Zheng, X. Guan, Q. Wang, and T. ...
T. M. Chen and J. Buford, Design considerations for a ...
R. Ezumalai and G. Aghila, Combinatorial approach for preventing SQL ...
M. Ficco, L. Coppolino, and L. Romano, A weight-based symptom ...
M. Junjin, An approach for SQL injection vulnerability detection, in ...
A. Kieyzun, P. J. Guo, K. Jayaraman, and M. D. ...
A. Liu, Y. Yuan, D. Wijesekera, and A. Stavrou, SQLProb: ...
S. Madan and S. Madan, Shielding against sql injection attacks ...
M. Monga, R. Paleari, and E. Passerini, A hybrid analysis ...
A. Razzaq, A. Hur, N. Haider, and F. Ahmad, Multi-layered ...
S. V. Shanmughaneethi, S. C. E. Shyni, and S. Swamynathan, ...
J. Skaruz and F. Seredynski, Intrusion detection in web applications: ...
S. Thomas, L. Williams, and T. Xie, On automated prepared ...
A. Anchlia and S. Jain, A Novel Injection Aware Approach ...
P. Bisht, P. Madhusudan, and V. Venkatakrishnan, CANDID: Dynamic candidate ...
P. Bisht, A. P. Sistla, and V. Venkatakrishnan, Taps: automatically ...
M. Bravenboer, E. Dolstra, and E. Visser, Preventing injection attacks ...
A. Ciampa, C. A. Visaggio, and M. Di Penta, A ...
D. Das, U. Sharma, and D. Bhattacharyya, An approach to ...
Z. Jan, M. Shah, A. Rauf, M. A. Khan, and ...
L. Ntagwabira and S. L. Kang, Use of Query Tokenization ...
A. Moosa, Artificial neural network based web application firewall for ...
L. Zhang, Q. Gu, S. Peng, X. Chen, H. Zhao, ...
B. Indrani and E. Ramaraj, X–Log Authentication Technique to Prevent ...
B. Hanmanthu, B. R. Ram, and P. Niranjan, SQL Injection ...
L. Liu et al., An effective penetration test approach based ...
A. Khalid and M. M. Yousif, Dynamic Analysis Tool for ...
S. Djanali, F. Arunanto, B. A. Pratomo, H. Studiawan, and ...
R. M. Nadeem, R. M. Saleem, R. Bashir, and S. ...
نمایش کامل مراجع