Applied Cryptography and Network Security
From MaRDI portal
Publication:4680948
Recommendations
Cited in
(8)- Defining code-injection attacks
- Simple linear string constraints
- A novel method for SQL injection attack detection based on removing SQL query attribute values
- A survey on server-side approaches to securing web applications
- Preventing injection attacks with syntax embeddings
- Simple and safe SQL queries with \texttt{C++} templates
- Protecting cookies against cross-site scripting attacks using cryptography
- The essence of command injection attacks in web applications
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680948)