Effective SQL injection attack reconstruction using network recording

Research output: Chapter in Book/Report/Conference proceedingPublished Conference contributionpeer-review

12 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Effective SQL injection attack reconstruction using network recording'. Together they form a unique fingerprint.
Sort by

Keyphrases

Computer Science