Detection and prevention for SQL injection attacks in stored procedures using real time web application
At present, web applications have been used for most of our activities in our life. Web applications are affected by the attacks of SQL injection. SQL injection is a prevalent technique that attackers appoint to impose the database in the most of web applications, by manipulate the SQL queries that...
| Main Author: | Salih Ali, Nabeel |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/15891/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=96202 |
| Abstract | Abstract here |
Similar Items
Preventing MS SQL Injection in Web Application
by: Khader, Aqeel Sahi
Published: (2010)
by: Khader, Aqeel Sahi
Published: (2010)
SQL-Injection Vulnerability Scanner Using Automatic Creation of SQL-Injection Attacks (MySqlinjector)
by: Shakhatreh, Ala' Yaseen Ibrahim
Published: (2010)
by: Shakhatreh, Ala' Yaseen Ibrahim
Published: (2010)
Database forensic analysis framework for SQL injection attack in MYSQL
by: Muhammad Razif Ab. Rahman
Published: (2025)
by: Muhammad Razif Ab. Rahman
Published: (2025)
A detection technique against malicious SQL attacks on web applications
by: Arif, Sarajaldeen Akram Bahjat
Published: (2026)
by: Arif, Sarajaldeen Akram Bahjat
Published: (2026)
A comparative study on the efficacy of SQL injection prevention methods
by: Shahbaaz Mohammed Hayat Chaki
Published: (2025)
by: Shahbaaz Mohammed Hayat Chaki
Published: (2025)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Improved robust estimator and clustering procedures for multivariate outliers detection
by: Sharifah Sakinah, Syed Abd Mutalib
Published: (2023)
by: Sharifah Sakinah, Syed Abd Mutalib
Published: (2023)
SQL Performance : Guideline for Tuning the SQL Queries in Oracle RDBMS
by: Nor'azah, Md. Khushairi
Published: (2005)
by: Nor'azah, Md. Khushairi
Published: (2005)
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
by: Mohd Foozy, Cik Feresa
Published: (2017)
by: Mohd Foozy, Cik Feresa
Published: (2017)
An improved SQL injection detection model in signature based IDS using tree structure
by: Amirmohammad Sadeghian
Published: (2025)
by: Amirmohammad Sadeghian
Published: (2025)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
Identifying Test Cases for Stored Procedure Using Cyclomatic Complexity Approach
by: Rosmah, Ismail
Published: (2009)
by: Rosmah, Ismail
Published: (2009)
Accurate Real Time Detection For Halal Logo Based On Fourier Magnitude Method
by: Ismail, Nurul Atiqah
Published: (2016)
by: Ismail, Nurul Atiqah
Published: (2016)
Reduced Fuzzy Recursive Least-Squares Algorithm For Real
Time Estimation
by: Cheah, Kah Wai
Published: (2018)
by: Cheah, Kah Wai
Published: (2018)
A novel secure mud-based real time intrusion detection and prevention mechanism for IoT network / Noman Mazhar
by: Noman , Mazhar
Published: (2023)
by: Noman , Mazhar
Published: (2023)
Real-Time Capable Multi-Hop Media Access Control Protocol For Smart Home Environment
by: M.Shukeri, Nurulfaizal
Published: (2017)
by: M.Shukeri, Nurulfaizal
Published: (2017)
A study of real hypersurfaces in complex space forms with condition on the Jacobi operator / Ren Shiquan
by: Ren, Shiquan
Published: (2012)
by: Ren, Shiquan
Published: (2012)
Big data technology information extraction and fusion from non-homogenous web data sources
by: Lee, Qi Zian
Published: (2025)
by: Lee, Qi Zian
Published: (2025)
Markovian Transition Probabilities: Estimation And Test Procedures
by: Sirdari, Mahboobeh Zangeneh
Published: (2013)
by: Sirdari, Mahboobeh Zangeneh
Published: (2013)
Detecting Structural Break In
Commodity Time Series Data
by: Jatarona , Nurul Najwa
Published: (2010)
by: Jatarona , Nurul Najwa
Published: (2010)
Parameter-driven count time series models / Nawwal Ahmad Bukhari
by: Nawwal , Ahmad Bukhari
Published: (2018)
by: Nawwal , Ahmad Bukhari
Published: (2018)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
A New Selection Procedure For Large Scale Problems
by: Almomani, Mohammad Hani
Published: (2012)
by: Almomani, Mohammad Hani
Published: (2012)
Secure Trust-Based Algorithm using Blockchain Technology to Prevent Attacks in VANET
by: Kuhanraj, Balan
Published: (2020)
by: Kuhanraj, Balan
Published: (2020)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
Enhancing anomaly detection performance in imbalanced datasets using a deep generative model and Tomeklinks approach
by: Barkah, Azhari Shouni
Published: (2025)
by: Barkah, Azhari Shouni
Published: (2025)
Optimised hybrid deep learning models for integrated energy modelling and anomaly detection under IPMVP compliance
by: Sukarti, Suziee
Published: (2025)
by: Sukarti, Suziee
Published: (2025)
Time arrival in series forecasting model for tourist National Park Kuala Tahan, Pahang
by: Megat Muhammad Afif, Megat Muainuddin
Published: (2021)
by: Megat Muhammad Afif, Megat Muainuddin
Published: (2021)
Bayes And Least-Squares Procedures In Sampling From Finite Populations
by: Mehrotra, Pretta Latha
Published: (1984)
by: Mehrotra, Pretta Latha
Published: (1984)
A two-warehouse inventory model with rework process and time-varying demand / Nurnadiah Nurhasril
by: Nurnadiah , Nurhasril
Published: (2021)
by: Nurnadiah , Nurhasril
Published: (2021)
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
by: Karimi, Mostafa
Published: (2019)
by: Karimi, Mostafa
Published: (2019)
Outlier detection in cylindrical data / Nurul Hidayah Sadikon
by: Nurul Hidayah , Sadikon
Published: (2018)
by: Nurul Hidayah , Sadikon
Published: (2018)
Information security risk management framework for Social Engineering attack and digital prevention techniques
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
by: Shekh Abdullah -Al-Musa Ahmed
Published: (2020)
On the prevention of Cross-VM cache-based side channel attacks / Zakira Inayat
by: Zakira, Inayat
Published: (2017)
by: Zakira, Inayat
Published: (2017)
Some Modification on Interval Symmetric Single-Step Procedure for Simultaneous Inclusion of Real Zzeros of Polynomials
by: Mohammad Rusli, Syaida Fadhilah
Published: (2011)
by: Mohammad Rusli, Syaida Fadhilah
Published: (2011)
Insider threats detection model for email content using statistical analysis
by: Mohammad, Nur Ameera Natasha
Published: (2022)
by: Mohammad, Nur Ameera Natasha
Published: (2022)
Constructing Polymorphic Virus Analysis System Using Behavior Detection Approach
by: Fauzi Adi, Rafrastara
Published: (2010)
by: Fauzi Adi, Rafrastara
Published: (2010)
Constructing polymorphic virus analysis system using behavior detection approach
by: Rasrastara, Fauzi Adi
Published: (2010)
by: Rasrastara, Fauzi Adi
Published: (2010)
New Power Analysis For The Pseudo-Median Procedure For More Than Two Groups
by: Alsaggaff, Ibtesam Ali
Published: (2013)
by: Alsaggaff, Ibtesam Ali
Published: (2013)
Automated Deform Detection For Automotive Body Panels Using Image Processing Techniques
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
by: Edris, Muhammad Zuhair Bolqiah
Published: (2016)
Similar Items
-
Preventing MS SQL Injection in Web Application
by: Khader, Aqeel Sahi
Published: (2010) -
SQL-Injection Vulnerability Scanner Using Automatic Creation of SQL-Injection Attacks (MySqlinjector)
by: Shakhatreh, Ala' Yaseen Ibrahim
Published: (2010) -
Database forensic analysis framework for SQL injection attack in MYSQL
by: Muhammad Razif Ab. Rahman
Published: (2025) -
A detection technique against malicious SQL attacks on web applications
by: Arif, Sarajaldeen Akram Bahjat
Published: (2026) -
A comparative study on the efficacy of SQL injection prevention methods
by: Shahbaaz Mohammed Hayat Chaki
Published: (2025)
