satu
by Mantoro1 Teddy
FILE
TIME SUBMITTED 21-JAN-2015 07:54PM
SUBMISSION ID 496908972
WORD COUNT 3431
8
%SIMILARITY INDEX
1
%
INTERNET SOURCES
5
%
PUBLICATIONS
3
%
STUDENT PAPERS
1
3
%ORIGINALITY REPORT
PRIMARY SOURCES
Submitted to Institute of Technology, Nirma University
Student Paper
Asaad Moosa. "Proposing a hybrid-intelligent framework to secure e-government web
applications", Proceedings of the 2nd International Conference on Theory and
Practice of Electronic Governance - ICEGOV 08 ICEGOV 08, 2008
Publication
www.cs.brown.edu
Internet Source
Jeom-Goo Kim, . "Injection Attack Detection Using the Removal of SQL Query Attribute Values", 2011 International Conference on Information Science and Applications, 2011. Publication
www.ijcnis.org
Internet Source
6
1
%7
1
%EXCLUDE QUOTES OFF
EXCLUDE
BIBLIOGRAPHY ON
EXCLUDE MATCHES < 1%
Validation-Based Solution for SQL-injection Attacks", 2011 First International Conference on Robot Vision and Signal Processing,
11/2011
Publication
Suraj Kothari. "Eliminating SQL Injection
Attacks - A Transparent Defense Mechanism", 2006 Eighth IEEE International Symposium on Web Site Evolution (WSE 06), 09/2006