Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
Sql injection detection algorithm based on Bi-LSTM and integrated feature selection
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1dS8MwFL348eKL8wv8Jg8-GrVJ17UwBjpWRFTQDkRfwl2T2o5Zca3s79uk7YroSx8bmnAoN7lt7znnApzhpPjmcjybYhgqauMVp6gQi-1u2aFju55rRGIv7t0re3p2_WElCstqtntdkjQndSN2sxjrUd1-VadFjy5WYb2rC0NFFAePo0YNyXu8ksf8P-9P0dPkEr8DYolCE6kvSiJJ-UvhF8O6tmpsC3gLNqvXTHJdxsU2rKh0Bzp1CwdS7ehdeOvHg-BrRpJ0ajhZaf8yHhCp8vKK4Oz9c57k8QfR6U6SYugmoffB-IFgKsnSbEKSSBmLUJKZxjrF3D3g_mg8vKU1bFHFbSYaE2ONXRTYhcEuFnwfiD6RmNNFySO0I0s7u0gHucsmqCST1gGct1nysN3tR7DBzMPk1GLHsJbPv9VJ2cPh1ETAD5octRU
The Journal Of Supercomputing, Volume 81, Issue 4.
Journal Article : Full Text Online
-
Using Nlp Techniques To Detect Sql Injection Attack Using Nlp Techniques To Detect (...)
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3dS8MwED_EJ19EUfCbe_C1rE3SksEYzGlxPghqQXwq1yZl6Jhz6_5_L0nFvQnqa-By4ZLcR3L3O4BLqjjmyvoqorq2kaJYRmSJ-Lonqs6U7mtfJPas717Ew6POxxutvlxOWIAHDoLrUZVWgiotKo5Fmlhqa4xSqTGJMppi67QvR-UbwRSfJHZy2LHoDJfTyYLvtPS9kH3ZPR9r8Q3SLzprku_BbucG4iiw34ctWh7A2v_f4_1sgcUXtOoKi3e8tu6pHwfT4dPHDCfzV58_NR_0pkMctS3Vb_h70kOY5DfF-DZy6ywXAX2idHjQfoClVHZSKn-SkjwCdPpEZCkZ2ZBqEofLYjKSTEPWCJMcw9XfGZ38xySnsOO6uoc8uzPYbpdrex66NVz4ff4EdRS0Iw
Majallat Jāmiʻat Dimashq Lil ʻulūm Al Handasīyah, Volume 39, Issue 3.
Journal Article : Full Text Online
-
Long short‐term memory on abstract syntax tree for SQL injection detection
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1ba9RAFB5affHFegNX22VAQRTSJDOTyQRqZS1dqhRrXaX4NMwt3ZY2WZot2jd_gr_RX-KcyUULIj74loQhTHLOfOcy35yD0FOlfczFCxYpY1zEVEIj5ZTyyz1lhjNRiHBI7Ei8_UwOP4jpzgra68_CBLY7YGNAabVYNLGtTTzJaZ5kgicsnhy82331W_eMy5fAf5YLB7nlZhXdBCUEctebyUGPyVmWhZ5i3lamkddY3hcqZUXclF_IZurtoLhmmkIF_wGnB8eVdpZnuoaaYc5Au95saSdtAuIaH7sv7Pg_Pu8Out05qnjSatZdtOKqe2itbwKBO0y4j2b7dXWMm7l34398-w5Aj8-BvXuF6worDZkUs8TNVbVUXzFsgWPvJuOt-fbscB-fVKeBClZtxfNtbN2yvXuAPk13P-7sRV2nhsgwkYhI08RaYXPYxXZJmTqSk0wpH3zpzLgyMxoE4IPttCyBFVJ4G8kS6yNzDyfccvoQYYA7wjNlaalYmULZGMsVFUQrZ4lNR-h5Lx1puvrl0EbjTIZ9dFZIkKQMkhyhJ8PYRVu144-jXoOQhxFQaTs8qC-OZbdwpbXKau_kmlIwxgjTpOSa5Vx7z62glI_QM5CnBDyAP6q6Yw115aCylvwl2hF6EbToLzOSs-kRCVeP_vm1j9EtAjybwCZaRzeWF5duo21tMUarhL0fhzzDOCyInzQWE64
Iet Software, Volume 15, Issue 2, pp. 188 - 197
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
SQL injection defenses
https://find.library.duke.edu/catalog/DUKE99119296085408501
Book : View Online
-
SQL injection strategies : practical techniques to secure old vulnerabilities against modern attacks
https://find.library.duke.edu/catalog/DUKE99119289549408501
Book : View Online
-
SQL injection attacks and defense
https://find.library.duke.edu/catalog/DUKE99119314293308501
Book : View Online
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info