Amanote Research

Amanote Research

    RegisterSign In

Security Slicing for Auditing XML, XPath, and SQL Injection Vulnerabilities

doi 10.1109/issre.2015.7381847
Full Text
Open PDF
Abstract

Available in full text

Date

November 1, 2015

Authors
Julian ThomeLwin Khin SharLionel Briand
Publisher

IEEE


Related search

Comparison of Security Testing Approaches for Detection of SQL Injection Vulnerabilities

International Journal of Engineering and Technology(UAE)
ArchitectureHardwareEngineeringChemical EngineeringBiotechnologyEnvironmental EngineeringComputer Science
2018English

JoanAudit: A Tool for Auditing Common Injection Vulnerabilities

2017English

XML Programming With SQL/XML and XQuery

IBM Systems Journal
2002English

Rewriting Regular XPath Queries on XML Views

2007English

Preventing SQL Injection Attacks

International Journal of Computer Applications
2012English

Security for XML Data Binding

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Application Layer Intrusion Detection for SQL Injection

2006English

An Efficient Technique for SQL Injection Detection and Prevention

IJCI. International Journal of Computers and Information
2014English

Security Vulnerabilities and System Intrusions

2001English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy