Old Web
English
Sign In
Acemap
>
Paper
>
Second-order SQL Injection Attack Defense Model
Second-order SQL Injection Attack Defense Model
2014
Yu Jie Tian
Ze-mao Zhao
Hai Chuan Zhang
Xue-shuang Li
Keywords:
Programming language
SQL injection
Computer science
order
SQL
Correction
Source
Cite
Save
Machine Reading By IdeaReader
0
References
0
Citations
NaN
KQI
[]