[1] |
郑成兴 . 网络入侵防范的理论与实践[M]. 北京: 机械工业出版社, 2006.
|
|
ZHENG C X . Network intrusion prevention theory and practice[M]. Beijing: China Machine PressPress, 2006.
|
[2] |
高鹏, 严望佳 . 构建安全的 Web 站点[M]. 北京: 清华大学出版社, 1999.
|
|
GAO P , YAN W J . Build a secure Web site[M]. Beijing: Tsinghua University PressPress, 1999.
|
[3] |
ANLEY,Chris. Advanced SQL injection in SQL server applications[R]. An NGSSoftware Insight Security Research (NISR) Publication, 2002.
|
[4] |
CLARKE J . SQL Injection Attacks and Defense[M]. Amsterdam: ElsevierPress, 2009.
|
[5] |
李鑫, 张维纬, 隋子畅 ,等. 新型SQL注入及其防御技术研究与分析[J]. 信息网络安全, 2016,2: 66-73.
|
|
LI X , ZHANG W W , SUI Z C ,et al. Research and analysis on the novel SQL injection and defense technique[J]. Netinfo Security, 2016,2: 66-73.
|
[6] |
BECHER M . Web application firewalls[D]. Akademikerverlag:Universiti Teknologi MARA, 2012.
|
[7] |
ROESCH M , . Snort:lightweight intrusion detection for networks[C]// The 13th Conference on Systems Administration (LISA-99),Usenix Association. 1999: 229-238.
|
[8] |
MI-YEON K , DONG H L . Data-mining based SQL injection attack detection using internal query trees[J]. Expert Systems with Applications, 2014(41): 5416-5430.
|
[9] |
石聪聪, 张涛, 余勇 ,等. 一种新的SQL注入防护方法的研究与实现[J]. 计算机科学, 2012,(S1): 60-64.
|
|
SHI C C , ZHANG T , YU Y , LIN W M . New approach for SQL-injection detection[J]. Computer Science, 2012,(S1): 60-64.
|
[10] |
成晓利 . Web 应用程序SQL 注入攻击漏洞测试系统的研究与实现[D]. 成都:西南交通大学, 2013.
|
|
CHENG X L . Research and implementation of Web application SQL injection vulnerability detection system[D]. Chengdu:Southwest Jiaotong University, 2013.
|
[11] |
褚龙现 . ASP.NET 应用中SQL注入攻击的分析与防范[J]. 计算机与现代化, 2014,(3): 151-153,160.
|
|
CHU L X . Analysis and defense of SQL injection attacks in ASP.NET application[J]. Computer and Modernization, 2014,(3): 151-153,160.
|
[12] |
WEI K , MUTHUPRASANNA M , KOTHARI S . Preventing SQL injection attacks in stored procedures[C]// IEEE Conference on Piscataway,Software Engineering. 2006: 191-198.
|
[13] |
黄龙军 . 存储过程技术在网络考试系统SQL 注入攻击防御上的应用[J]. 计算机系统应用, 2013,22(1): 103-106.
|
|
HUANG L J . Application of stored procedures to defense against SQL injection attacks in online examination system[J]. Computer Systems & Applications, 2013,22(1): 103-106.
|
[14] |
杨玉龙, 彭长根, 周洲 . 基于同态加密的防止 SQL 注入攻击解决方案[J]. 信息网络安全, 2014,(1): 30-33.
|
|
YANG Y L , PENG C G , ZHOU Z . A solution of preventing SQL injection attacks based on homomorphic encryption[J]. Netinfo Security, 2014,(1): 30-33.
|
[15] |
赵宇飞, 熊刚, 贺龙涛 ,等. 面向网络环境的SQL注入行为检测方法[J]. 通信学报, 2016,02: 88-97.
|
|
ZHAO Y F , XIONG G , HE L T ,et al. Approach to detecting SQL injection behaviors in network environment[J]. Journal on Communications, 2016,02: 88-97.
|