Open Access
Issue
MATEC Web Conf.
Volume 173, 2018
2018 International Conference on Smart Materials, Intelligent Manufacturing and Automation (SMIMA 2018)
Article Number 01004
Number of page(s) 5
Section Modeling, Analysis, and Simulation of Intelligent Manufacturing Processes
DOI https://doi.org/10.1051/matecconf/201817301004
Published online 19 June 2018
  1. OWASP TOP Ten. [EB/OL], (2017) [Google Scholar]
  2. 2016 China Website Security Vulnerablity Analysus Report. [EB/OL], (2016) [Google Scholar]
  3. Tao Han. Research on SQL injection detection method based on analytic tree[D]. Harbin Institute of Technology, (2013) [Google Scholar]
  4. Tian Y J, Zhao Z M, Zhang H C. Second-order SQL Injection Atteck Defense Model, Netinfo Security, 11(2014) [Google Scholar]
  5. Wahid Rajeh, Alshreef Abed. A novel three-tier SQLi detectin and mitigation scheme for cloud enviroments, ICECIS, 33-37(2017) [Google Scholar]
  6. Suraj Natarajan, Melody Moh. Recommending News Based on Hybrid User Profile Popularity Trends and Location, CTS,204-211(2016) [Google Scholar]
  7. Wu Shao hua, Chen Shu bao.Web Attack Dtection Method Based on Support Vector Mechines, Computer Science, 42(2015) [Google Scholar]
  8. Chen xiao bing, Zhang Han yu, Luo Li ming, Research on technology of SQL injection attacks and detection. Comput Eng Appl, 43(2007) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.