Works matching SQL injection
1
- Przegląd Elektrotechniczny, 2022, n. 7, p. 181, doi. 10.15199/48.2022.07.30
- Deriba, Fitsum Gizachew;
- SALAU, Ayodeji Olalekan;
- Mohammed, Shaimaa Hadi;
- Kassa, Tsegay Mullu;
- Demilie, Wubetu Barud
- Article
2
- Journal of Supercomputing, 2025, v. 81, n. 4, p. 1, doi. 10.1007/s11227-025-07109-w
- Qin, Qiurong;
- Li, Yueqin;
- Mi, Yajie;
- Shen, Jinhui;
- Wu, Kexin;
- Wang, Zhenzhao
- Article
3
- Multi-Knowledge Electronic Comprehensive Journal For Education & Science Publications (MECSJ), 2020, n. 28, p. 1
- Aziz, Makera M.;
- Ahmed, Dina Rafaa
- Article
4
- Journal on Communication / Tongxin Xuebao, 2021, v. 42, n. 4, p. 127, doi. 10.11959/j.issn.1000-436x.2021046
- Article
5
- African Journal of Computing & ICT, 2019, v. 12, n. 1, p. 51
- Dalhatu, Mu'awuya;
- Ahmad, Aliyu Sani;
- Hambali, Moshood Abiola
- Article
6
- Journal Of Sichuan University (Natural Sciences Division) / Sichuan Daxue Xuebao-Ziran Kexueban, 2022, v. 59, n. 6, p. 1, doi. 10.19907/j.0490-6756.2022.062001
- ZHAO Wei;
- ZHOUYing-Jie;
- LI Zheng-Hui;
- YANG Song;
- LÜ Jian-Cheng
- Article
7
- i-Manager's Journal on Computer Science, 2015, v. 3, n. 3, p. 5, doi. 10.26634/jcom.3.3.3660
- NAGPAL, BHARTI;
- CHAUHAN, NARESH;
- SINGH, NANHAY
- Article
8
- Electronics (2079-9292), 2024, v. 13, n. 15, p. 2946, doi. 10.3390/electronics13152946
- Yuan, Ye;
- Lu, Yuliang;
- Zhu, Kailong;
- Huang, Hui;
- Chen, Yuanchao;
- Zhang, Yifan
- Article
9
- Electronics (2079-9292), 2023, v. 12, n. 6, p. 1344, doi. 10.3390/electronics12061344
- Lu, Dongzhe;
- Fei, Jinlong;
- Liu, Long
- Article
10
- Information Security Journal: A Global Perspective, 2023, v. 32, n. 4, p. 252, doi. 10.1080/19393555.2021.1995537
- Nasereddin, Mohammed;
- ALKhamaiseh, Ashaar;
- Qasaimeh, Malik;
- Al-Qassas, Raad
- Article
11
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2020, v. 37, n. 9, p. 2793, doi. 10.19734/J.ISSN.1001-3695.2019.04.0153
- Article
12
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2020, v. 37, n. 7, p. 2117, doi. 10.19734/j.issn.1001-3695.2018.12.0943
- Article
13
- Technical Journal / Tehnički Glasnik, 2021, v. 15, n. 1, p. 112, doi. 10.31803/tg-20210205101347
- Article
14
- Ingeniería (0121-750X), 2020, v. 25, n. 3, p. 1, doi. 10.14483/23448393.15740
- Moreno Marín, John Edison;
- Coronado Sánchez, Paulo Cesar
- Article
15
- Software Testing: Verification & Reliability, 2022, v. 32, n. 6, p. 1, doi. 10.1002/stvr.1826
- Garn, Bernhard;
- Zivanovic, Jovan;
- Leithner, Manuel;
- Simos, Dimitris E.
- Article
16
- Future Internet, 2023, v. 15, n. 4, p. 133, doi. 10.3390/fi15040133
- Guan, Yuting;
- He, Junjiang;
- Li, Tao;
- Zhao, Hui;
- Ma, Baoqiang
- Article
17
- Electronic Journal of Computer Science & Information Technology, 2011, v. 3, n. 1, p. 26
- Ahmad, Khaleel;
- Shekhar, Jayant;
- Yadav, K. P.
- Article
18
- Journal of Digital Forensics, Security & Law, 2017, v. 12, n. 2, p. 97
- Horner, Matthew;
- Hyslip, Thomas
- Article
19
- International Journal of Information Security & Privacy, 2020, v. 14, n. 2, p. N.PAG, doi. 10.4018/IJISP.2020040102
- Silva, Rui Filipe;
- Barbosa, Raul;
- Bernardino, Jorge
- Article
20
- Journal of Information Science & Engineering, 2023, v. 39, n. 1, p. 167, doi. 10.6688/JISE.202301_39(1).0010
- YI-CHUAN WANG;
- GUI-LING ZHANG;
- YA-LING ZHANG
- Article
21
- Applied Sciences (2076-3417), 2025, v. 15, n. 2, p. 571, doi. 10.3390/app15020571
- Lo, Rui-Teng;
- Hwang, Wen-Jyi;
- Tai, Tsung-Ming
- Article
22
- Applied Sciences (2076-3417), 2023, v. 13, n. 21, p. 11763, doi. 10.3390/app132111763
- Yuan, Ye;
- Lu, Yuliang;
- Zhu, Kailong;
- Huang, Hui;
- Yu, Lu;
- Zhao, Jiazhen
- Article
23
- Applied Sciences (2076-3417), 2023, v. 13, n. 16, p. 9466, doi. 10.3390/app13169466
- Sun, Hao;
- Du, Yuejin;
- Li, Qi
- Article
24
- Applied Sciences (2076-3417), 2023, v. 13, n. 7, p. 4365, doi. 10.3390/app13074365
- Alarfaj, Fawaz Khaled;
- Khan, Nayeem Ahmad
- Article
25
- Journal of Information Systems & Operations Management, 2020, v. 14, n. 1, p. 68
- IACOB, Ionel;
- PIRNAU, Mironela
- Article
26
- KSII Transactions on Internet & Information Systems, 2020, v. 14, n. 6, p. 2576, doi. 10.3837/tiis.2020.06.014
- Article
27
- Journal of Cybersecurity & Privacy, 2022, v. 2, n. 4, p. 764, doi. 10.3390/jcp2040039
- Alghawazi, Maha;
- Alghazzawi, Daniyal;
- Alarifi, Suaad
- Article
28
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 2, Part 2, p. 1569
- Bobade, Nilima D.;
- Sherekar, S. S.
- Article
29
- Grenze International Journal of Engineering & Technology (GIJET), 2024, v. 10, n. 1, Part 3, p. 2492
- Bobade, Nilima D.;
- Sherekar, Swati S.
- Article
30
- Journal of Basrah Researches (Sciences), 2024, v. 50, n. 1, p. 340, doi. 10.56714/bjrs.50.1.27
- Article
31
- Journal of Basrah Researches (Sciences), 2020, v. 46, n. 1, p. 1
- Shwaish, Alaa Khudhair;
- Hussain, Mohammed Abdulridha;
- Al-Kashoash, Hayder A. A.
- Article
32
- Neural Computing & Applications, 2024, v. 36, n. 12, p. 6771, doi. 10.1007/s00521-024-09429-z
- Arasteh, Bahman;
- Aghaei, Babak;
- Farzad, Behnoud;
- Arasteh, Keyvan;
- Kiani, Farzad;
- Torkamanian-Afshar, Mahsa
- Article
33
- African Journal of Computing & ICT, 2021, v. 14, n. 1, p. 1
- Evwiekpaefe, Abraham E.;
- Habila, Isacha
- Article
34
- Journal of Information Processing Systems, 2017, v. 13, n. 4, p. 689
- Nagpal, Bharti;
- Chauhan, Naresh;
- Singh, Nanhay
- Article
35
- Journal of Algebraic Statistics, 2022, v. 13, n. 3, p. 5038
- Shanmuganathan, S.;
- Srinivasan, D.
- Article
36
- Journal of Computational Analysis & Applications, 2025, v. 34, n. 4, p. 84
- Begum, Zareena;
- Sravani, Peddapally;
- Priya, Mamidi Sai;
- Kumari, Poddar Nandini;
- Rakesh, Gajjala
- Article
37
- Mathematics (2227-7390), 2024, v. 12, n. 18, p. 2917, doi. 10.3390/math12182917
- Arasteh, Bahman;
- Bouyer, Asgarali;
- Sefati, Seyed Salar;
- Craciunescu, Razvan
- Article
38
- Mathematics (2227-7390), 2023, v. 11, n. 15, p. 3286, doi. 10.3390/math11153286
- Alghawazi, Maha;
- Alghazzawi, Daniyal;
- Alarifi, Suaad
- Article
39
- International Journal of Information Security, 2024, v. 23, n. 2, p. 1541, doi. 10.1007/s10207-023-00791-y
- Article
40
- International Journal of Information Security, 2024, v. 23, n. 1, p. 225, doi. 10.1007/s10207-023-00738-3
- Sommervoll, Åvald Åslaugson;
- Erdődi, László;
- Zennaro, Fabio Massimo
- Article
41
- International Journal of Information Security, 2019, v. 18, n. 1, p. 1, doi. 10.1007/s10207-017-0393-x
- Das, Debasish;
- Sharma, Utpal;
- Bhattacharyya, D. K.
- Article
42
- International Journal of Information Security & Cybercrime, 2014, v. 3, n. 2, p. 61, doi. 10.19107/ijisc.2014.02.07
- Article
43
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 678
- Sadotra, Parveen;
- Sharma, Chandrakant
- Article
44
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 5, p. 525
- Rawat, Romil;
- Patearia, Nikhil;
- Dhariwal, Sumit
- Article
45
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 5, p. 461
- Dhariwal, Sumit;
- Patearia, Nikhil;
- Rawat, Romil
- Article
46
- EURASIP Journal on Information Security, 2020, v. 2020, n. 1, p. N.PAG, doi. 10.1186/s13635-020-00113-y
- Abikoye, Oluwakemi Christiana;
- Abubakar, Abdullahi;
- Dokoro, Ahmed Haruna;
- Akande, Oluwatobi Noah;
- Kayode, Aderonke Anthonia
- Article
47
- Security & Communication Networks, 2015, v. 8, n. 15, p. 2545, doi. 10.1002/sec.1199
- Article
48
- Computers, Materials & Continua, 2025, v. 84, n. 1, p. 1145, doi. 10.32604/cmc.2025.063319
- Chen, Yuqi;
- Liang, Guangjun;
- Wang, Qun
- Article
49
- Ingénierie des Systèmes d'Information, 2024, v. 29, n. 5, p. 1915, doi. 10.18280/isi.290523
- Article
50
- i-Manager's Journal on Software Engineering, 2018, v. 12, n. 3, p. 16, doi. 10.26634/jse.12.3.14556
- YAMINI, B.;
- BRINDHA, L.;
- DEEPANANDA ARTHI, S.
- Article