您当前的位置:
首页 >
文章列表页 >
Approach to detecting SQL injection behaviors in network environment
academic paper | 更新时间:2024-06-05
    • Approach to detecting SQL injection behaviors in network environment

    • Journal on Communications   Vol. 37, Issue 2, Pages: 89-98(2016)
    • DOI:10.11959/j.issn.1000-436x.2016034    

      CLC: TP393
    • Online First:2016-02

      Published:15 February 2016

    移动端阅览

  • Yu-fei ZHAO, Gang XIONG, Long-tao HE, et al. Approach to detecting SQL injection behaviors in network environment[J]. Journal on Communications, 2016, 37(2): 89-98. DOI: 10.11959/j.issn.1000-436x.2016034.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

2251

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Network traffic cognition model based on space-time fractals
Research on traffic representation in network anomaly detection
Network intrusion detection method based on VAE-CWGAN and fusion of statistical importance of feature
Adaptive random early detection algorithm based on network traffic level grade prediction
Network traffic anomaly detection method based on multi-scale characteristic

Related Author

DONG Guoqing
DONG Yuning
ZHANG Hui
TANG Pingping
CHANG Heyu
ZHANG Bin
SUN Jianwen
Yu FU

Related Institution

Anhui Huadong Photoelectric Technology Research Institute Co., Ltd.
College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications
School of Physics and Electronic Information, Anhui Normal University
Cryptography Engineering Institute, Information Engineering University
School of Mathematics and Information Engineering, Xinyang Vocational and Technical College
0