NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 12,277
1.
  • Studying the characteristic... Studying the characteristics of SQL-related development tasks: An empirical study
    Costa, Daniel Alencar da; Grattan, Natalie; Stanger, Nigel ... Empirical software engineering : an international journal, 06/2023, Volume: 28, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    A key function of a software system is its ability to facilitate the manipulation of data, which is often implemented using a flavour of the Structured Query Language (SQL). To develop the data ...
Full text
2.
  • Big Data: New Tricks for Ec... Big Data: New Tricks for Econometrics
    Varian, Hal R. The Journal of economic perspectives, 04/2014, Volume: 28, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Computers are now involved in many economic transactions and can capture data associated with these transactions, which can then be manipulated and analyzed. Conventional statistical and econometric ...
Full text

PDF
3.
  • The MongoDB injection datas... The MongoDB injection dataset: A comprehensive collection of MongoDB - NoSQL injection attempts and vulnerabilities
    D․ L․, Rameshwar; H․ V․, Ankush; Honnavalli, Prasad B․ ... Data in brief, June 2024, 2024-Jun, 2024-06-00, 20240601, 2024-06-01, Volume: 54
    Journal Article
    Peer reviewed
    Open access

    We present the ‘NoSQL Injection Dataset for MongoDB, a comprehensive collection of data obtained from diverse projects focusing on NoSQL attacks on MongoDB databases. In the present era, we can ...
Full text
4.
  • Comparación de algoritmos d... Comparación de algoritmos de búsqueda binarios y secuenciales para evaluar el riesgo de inyecciones SQL inferenciales en aplicaciones web
    Taborda, Alexis Miguel; Duque, Francisco Javier Valencia RISTI : Revista Ibérica de Sistemas e Tecnologias de Informação, 09/2020 E34
    Journal Article
    Peer reviewed
    Open access

    Resumen: Desde hace varios años y de acuerdo con el Open Web Application Security Project Foundation (OWASP), el riesgo de inyección SQL ha estado liderando el listado de los 10 principales riesgos ...
Full text
5.
  • A mental model approach to ... A mental model approach to teaching database querying skills with SQL and Alteryx
    Lee, Lorraine; Casterella, Gretchen Journal of accounting education, September 2023, 2023-09-00, Volume: 64
    Journal Article
    Peer reviewed

    •Describes an instructional approach and exercises to introduce a data analytics tool into a course covering relational databases and structured query language (SQL).•We position SQL as the mental ...
Full text
6.
  • The Importance of Developin... The Importance of Developing Preventive Techniques for SQL Injection Attacks
    Bedeković, Nenad; Havaš, Ladislav; Horvat, Tomislav ... Tehnički glasnik, 09/2022, Volume: 16, Issue: 4
    Journal Article, Web Resource
    Peer reviewed
    Open access

    Many intentionally vulnerable web applications are circulating on the Internet that serve as a legal test ground for practicing SQL injection attacks. For demonstration purposes the attacks will ...
Full text
7.
  • SQLPsdem: A Proxy-based Mec... SQLPsdem: A Proxy-based Mechanism towards Detecting, Locating and Preventing Second-Order SQL Injections
    Zhang, Bing; Ren, Rong; Liu, Jia ... IEEE transactions on software engineering, 2024
    Journal Article
    Peer reviewed

    Due to well-hidden and stage-triggered properties of second-order SQL injections in web applications, current approaches are ineffective in addressing them and still report high false negatives and ...
Full text
8.
  • LSTM-Based SQL Injection De... LSTM-Based SQL Injection Detection Method for Intelligent Transportation System
    Li, Qi; Wang, Fang; Wang, Junfeng ... IEEE transactions on vehicular technology, 05/2019, Volume: 68, Issue: 5
    Journal Article
    Peer reviewed

    Intelligent transportation is an emerging technology that integrates advanced sensors, network communication, data processing, and automatic control technologies to provide great convenience for our ...
Full text
9.
  • Mastering PostgreSQL 13 Mastering PostgreSQL 13
    Schönig, Hans-Jürgen 2020
    eBook

    Updated to include the new features introduced in PostgreSQL 13, this book shows you how to build better PostgreSQL applications and administer your PostgreSQL database efficiently. You'll master the ...
Full text
10.
  • Vulnerability detection and... Vulnerability detection and prevention of SQL injection
    J. Santhosh Kumar, B; P. Anaswara, P International journal of engineering & technology (Dubai), 05/2018, Volume: 7, Issue: 2.31
    Journal Article
    Open access

    SQL injection attack is the most serious security vulnerabilities on databases are connected with web or within an intranet, most of these vulnerabilities are affected by lack of input validation and ...
Full text

PDF
1 2 3 4 5
hits: 12,277

Load filters