Review of SQL injection : problems and prevention
SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks. Although technology had improved a lot during these past years, but, hackers still can...
Main Authors: | Mohd Yunus, Mohd Amin, Brohan, Muhammad Zainulariff, Mohd Nawi, Nazri, Mat Surin, Ely Salwana, Md Najib, Nurhakimah Azwani, Chan, Wei Liang |
---|---|
Format: | Article |
Language: | English |
Published: |
Politeknik Negeri Padang
2018
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/5635/1/AJ%202018%20%28281%29.pdf |
Similar Items
-
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
by: Bashah Mat Ali, Abdul, et al.
Published: (2011) -
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
by: Mat Ali, Abdul Bashah, et al.
Published: (2011) -
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011) -
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016) -
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)