Intercepting Filter Approach to Injection Flaws
Ahmed Salem, Journal of Information Processing Systems Vol. 6, No. 4, pp. 563-574, Dec. 2010
https://doi.org/ 10.3745/JIPS.2010.6.4.563
Keywords: Injection Flaws, SQL Injection, Intercepting Filter, Cross-site Scripting Vulnerability
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Salem, A. (2010). Intercepting Filter Approach to Injection Flaws . Journal of Information Processing Systems, 6(4), 563-574. DOI: 10.3745/JIPS.2010.6.4.563 .
[IEEE Style]
A. Salem, "Intercepting Filter Approach to Injection Flaws ," Journal of Information Processing Systems, vol. 6, no. 4, pp. 563-574, 2010. DOI: 10.3745/JIPS.2010.6.4.563 .
[ACM Style]
Ahmed Salem. 2010. Intercepting Filter Approach to Injection Flaws . Journal of Information Processing Systems, 6, 4, (2010), 563-574. DOI: 10.3745/JIPS.2010.6.4.563 .