Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,834,460 papers from all fields of science
Search
Sign In
Create Free Account
SQL injection
Known as:
SQL inject
, Little Bobby Tables
, Sql injection attack
Expand
SQL injection is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Application security
Application service architecture
Asprox botnet
Attack patterns
Expand
Broader (1)
SQL
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Porous titanium implants fabricated by metal injection molding
Liang-jian Chen
,
Ting-Bo Li
,
Yi-min Li
,
He Hao
,
You-hua Hu
2009
Corpus ID: 55470010
Review
2009
Review
2009
A survey of SQL injection defense mechanisms
Kasra Amirtahmasebi
,
Seyed Reza Jalalinia
,
S. Khadem
International Conference for Internet Technology…
2009
Corpus ID: 15223494
SQL Injection Attack (SQLIA) is a prevalent method which makes it possible for the attackers to gain direct access to the…
Expand
2007
2007
Automated Protection of PHP Applications Against SQL-injection Attacks
E. Merlo
,
Dominic Letarte
,
G. Antoniol
European Conference on Software Maintenance and…
2007
Corpus ID: 5930323
Web sites may be static sites, programs, or databases, and very often a combination of the three integrating relational databases…
Expand
Highly Cited
2006
Highly Cited
2006
Application layer intrusion detection for SQL injection
Frank S. Rietta
ACM-SE 44
2006
Corpus ID: 13901704
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While…
Expand
2006
2006
SQLUnitGen: Test Case Generation for SQL Injection Detection
Yonghee Shin
,
L. Williams
,
Tao Xie
2006
Corpus ID: 105259
More than half of all of the vulnerabilities reported can be classified as input manipulation, such as SQL injection, cross site…
Expand
Highly Cited
2003
Highly Cited
2003
Interactions between the endocrine and immune systems in locusts
G. Goldsworthy
,
L. Mullen
,
K. Opoku-Ware
,
S. Chandrakant
2003
Corpus ID: 83591749
Abstract. The prophenoloxidase cascade in the haemolymph of mature adult Locusta migratoria migratorioides (R & F) is activated…
Expand
Highly Cited
2001
Highly Cited
2001
Effect of Pressure Gradient and Initial Water Saturation on Water Injection in Water-Wet and Mixed-Wet Fractured Porous Media
G. Tang
,
A. Firoozabadi
2001
Corpus ID: 54571783
Summary A systematic study of the effect of wettability and initial water saturation on water injection and imbibition is made in…
Expand
1996
1996
On vertex operator algebras as sl 2 -modules
C. Dong
,
Zongzhu Lin
,
G. Mason
1996
Corpus ID: 19017386
Suppose that V is a vertex operator algebra (VOA). One of the axioms for a VOA is that V is a module for the Virasoro algebra Vir…
Expand
1994
1994
Pulsed acceleration in solar flares
M. Aschwanden
,
A. Benz
,
B. Dennis
,
M. Kundu
1994
Corpus ID: 14004392
We study the nonlinear dynamics of particle acceleration in solar flares by analyzing the time series of various quasi-periodic…
Expand
Highly Cited
1977
Highly Cited
1977
Antibiotic administration in the treatment of bacterial endophthalmitis. II. Intravitreal injections.
Peyman Ga
1977
Corpus ID: 77579425
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required