您当前的位置:
首页 >
文章列表页 >
Penetration test method using blind SQL injection based on second-order fragment and reassembly
Papers | 更新时间:2024-06-05
    • Penetration test method using blind SQL injection based on second-order fragment and reassembly

    • Journal on Communications   Vol. 38, Issue Z1, Pages: 73-82(2017)
    • DOI:10.11959/j.issn.1000-436x.2017238    

      CLC: TP393
    • Online First:2017-10

      Published:25 October 2017

    移动端阅览

  • De-guang LE, Sheng-rong GONG, Shao-gang WU, et al. Penetration test method using blind SQL injection based on second-order fragment and reassembly[J]. Journal on Communications, 2017, 38(Z1): 73-82. DOI: 10.11959/j.issn.1000-436x.2017238.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

1672

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Privacy level evaluation of differential privacy for time series based on filtering theory
Approach to detecting SQL injection behaviors in network environment
Study on choosing the parameter ε in differential privacy

Related Author

Wen-jun XIONG
Zheng-quan XU
Hao WANG
Yu-fei ZHAO
Gang XIONG
Long-tao HE
Zhou-jun LI
Xian-mang HE

Related Institution

State Key Laboratory of Information Engineering in Surveying,Mapping and Remote Sensing,Wuhan University
Collaborative Innovation Center for Geospatial Technology,Wuhan University
School of Computer Science, Beihang University
Institute of Information Engineering, Chinese Academy of Sciences
National Computer Network Emergency Response Technical Team/Coordination Center of China
0