Detection and prevention for SQL injection attacks in stored procedures using real time web application
At present, web applications have been used for most of our activities in our life. Web applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique that attackers appoint to impose the database in the most of web applications, by manipulate the SQL queries that...
| Main Author: | Salih Ali, Nabeel |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/15891/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=96202 |
| Abstract | Abstract here |
Similar Items
Preventing MS SQL Injection in Web Application
by: Khader, Aqeel Sahi
Published: (2010)
by: Khader, Aqeel Sahi
Published: (2010)
SQL-Injection Vulnerability Scanner Using Automatic Creation of SQL-Injection Attacks (MySqlinjector)
by: Shakhatreh, Ala' Yaseen Ibrahim
Published: (2010)
by: Shakhatreh, Ala' Yaseen Ibrahim
Published: (2010)
Database forensic analysis framework for SQL injection attack in MYSQL
by: Muhammad Razif Ab. Rahman
Published: (2025)
by: Muhammad Razif Ab. Rahman
Published: (2025)
A detection technique against malicious SQL attacks on web applications
by: Arif, Sarajaldeen Akram Bahjat
Published: (2026)
by: Arif, Sarajaldeen Akram Bahjat
Published: (2026)
A comparative study on the efficacy of SQL injection prevention methods
by: Shahbaaz Mohammed Hayat Chaki
Published: (2025)
by: Shahbaaz Mohammed Hayat Chaki
Published: (2025)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Improved robust estimator and clustering procedures for multivariate outliers detection
by: Sharifah Sakinah, Syed Abd Mutalib
Published: (2023)
by: Sharifah Sakinah, Syed Abd Mutalib
Published: (2023)
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
by: Mohd Foozy, Cik Feresa
Published: (2017)
by: Mohd Foozy, Cik Feresa
Published: (2017)
SQL Performance : Guideline for Tuning the SQL Queries in Oracle RDBMS
by: Nor'azah, Md. Khushairi
Published: (2005)
by: Nor'azah, Md. Khushairi
Published: (2005)
An improved SQL injection detection model in signature based IDS using tree structure
by: Amirmohammad Sadeghian
Published: (2025)
by: Amirmohammad Sadeghian
Published: (2025)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
Identifying Test Cases for Stored Procedure Using Cyclomatic Complexity Approach
by: Rosmah, Ismail
Published: (2009)
by: Rosmah, Ismail
Published: (2009)
Accurate Real Time Detection For Halal Logo Based On Fourier Magnitude Method
by: Ismail, Nurul Atiqah
Published: (2016)
by: Ismail, Nurul Atiqah
Published: (2016)
Reduced Fuzzy Recursive Least-Squares Algorithm For Real
Time Estimation
by: Cheah, Kah Wai
Published: (2018)
by: Cheah, Kah Wai
Published: (2018)
Big data technology information extraction and fusion from non-homogenous web data sources
by: Lee, Qi Zian
Published: (2025)
by: Lee, Qi Zian
Published: (2025)
A study of real hypersurfaces in complex space forms with condition on the Jacobi operator / Ren Shiquan
by: Ren, Shiquan
Published: (2012)
by: Ren, Shiquan
Published: (2012)
A novel secure mud-based real time intrusion detection and prevention mechanism for IoT network / Noman Mazhar
by: Noman , Mazhar
Published: (2023)
by: Noman , Mazhar
Published: (2023)
Real-Time Capable Multi-Hop Media Access Control Protocol For Smart Home Environment
by: M.Shukeri, Nurulfaizal
Published: (2017)
by: M.Shukeri, Nurulfaizal
Published: (2017)
Markovian Transition Probabilities: Estimation And Test Procedures
by: Sirdari, Mahboobeh Zangeneh
Published: (2013)
by: Sirdari, Mahboobeh Zangeneh
Published: (2013)
Parameter-driven count time series models / Nawwal Ahmad Bukhari
by: Nawwal , Ahmad Bukhari
Published: (2018)
by: Nawwal , Ahmad Bukhari
Published: (2018)
Detecting Structural Break In
Commodity Time Series Data
by: Jatarona , Nurul Najwa
Published: (2010)
by: Jatarona , Nurul Najwa
Published: (2010)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
by: Barkah, Azhari Shouni
Published: (2025)
by: Barkah, Azhari Shouni
Published: (2025)
Optimised hybrid deep learning models for integrated energy modelling and anomaly detection under IPMVP compliance
by: Sukarti, Suziee
Published: (2025)
by: Sukarti, Suziee
Published: (2025)
Time arrival in series forecasting model for tourist National Park Kuala Tahan, Pahang
by: Megat Muhammad Afif, Megat Muainuddin
Published: (2021)
by: Megat Muhammad Afif, Megat Muainuddin
Published: (2021)
A New Selection Procedure For Large Scale Problems
by: Almomani, Mohammad Hani
Published: (2012)
by: Almomani, Mohammad Hani
Published: (2012)
Effectiveness of structured query language injection attacks detection mechanisms
Published: (2025)
Published: (2025)
A two-warehouse inventory model with rework process and time-varying demand / Nurnadiah Nurhasril
by: Nurnadiah , Nurhasril
Published: (2021)
by: Nurnadiah , Nurhasril
Published: (2021)
Bayes And Least-Squares Procedures In Sampling From Finite Populations
by: Mehrotra, Pretta Latha
Published: (1984)
by: Mehrotra, Pretta Latha
Published: (1984)
Secure Trust-Based Algorithm using Blockchain Technology to Prevent Attacks in VANET
by: Kuhanraj, Balan
Published: (2020)
by: Kuhanraj, Balan
Published: (2020)
Outlier detection in cylindrical data / Nurul Hidayah Sadikon
by: Nurul Hidayah , Sadikon
Published: (2018)
by: Nurul Hidayah , Sadikon
Published: (2018)
Insider threats detection model for email content using statistical analysis
by: Mohammad, Nur Ameera Natasha
Published: (2022)
by: Mohammad, Nur Ameera Natasha
Published: (2022)
Constructing Polymorphic Virus Analysis System Using Behavior Detection Approach
by: Fauzi Adi, Rafrastara
Published: (2010)
by: Fauzi Adi, Rafrastara
Published: (2010)
Constructing polymorphic virus analysis system using behavior detection approach
by: Rasrastara, Fauzi Adi
Published: (2010)
by: Rasrastara, Fauzi Adi
Published: (2010)
Automated Deform Detection For Automotive Body Panels Using Image Processing Techniques
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
by: Karimi, Mostafa
Published: (2019)
by: Karimi, Mostafa
Published: (2019)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
Estimation and outlier detection of random coefficient autoregressive models / Norli Anida binti Abdullah
by: Abdullah, Norli Anida
Published: (2009)
by: Abdullah, Norli Anida
Published: (2009)
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
by: Mohd Yusoff, Mohd Izhan
Published: (2014)
by: Mohd Yusoff, Mohd Izhan
Published: (2014)
Dimension Reduction For Classification Using Principal Component Analysis (PCA) To Detect Malicious Executables
by: Jamal, Zalifh
Published: (2017)
by: Jamal, Zalifh
Published: (2017)
Similar Items
-
Preventing MS SQL Injection in Web Application
by: Khader, Aqeel Sahi
Published: (2010) -
SQL-Injection Vulnerability Scanner Using Automatic Creation of SQL-Injection Attacks (MySqlinjector)
by: Shakhatreh, Ala' Yaseen Ibrahim
Published: (2010) -
Database forensic analysis framework for SQL injection attack in MYSQL
by: Muhammad Razif Ab. Rahman
Published: (2025) -
A detection technique against malicious SQL attacks on web applications
by: Arif, Sarajaldeen Akram Bahjat
Published: (2026) -
A comparative study on the efficacy of SQL injection prevention methods
by: Shahbaaz Mohammed Hayat Chaki
Published: (2025)
