SQL Injection in Oracle: An exploration of vulnerabilities, International Journal on Computer Science and Engineering, pp.522-531, 2012. ,
Comparison of SQL Injection Detection and Prevention Techniques, 2nd International Conforence on Education Technology and Computer (ICETC), 2010. ,
Anomaly detection of web-based attacks, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, p.251261, 2003. ,
DOI : 10.1145/948109.948144
AMNESIA, Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering , ASE '05, pp.174-183, 2005. ,
DOI : 10.1145/1101908.1101935
SQLrand: Preventing SQL Injection Attacks, Proceedings of the 2nd Applied Cryptography and Network Security (ACNS) Conference, pp.292-302, 2004. ,
DOI : 10.1007/978-3-540-24852-1_21
ModSecurity Handbook: The Complete Guide to the Popular Open Source Web Application Firewall, Feisty Duck Ltd Edition, vol.ISBN, 2010. ,
Principes et pratiques An Evaluation of Naive Bayesian Anti-Spam Filtering, Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning, p.917, 2000. ,
CJassification of malicious web code by machine learning, OII 3rd International Conference, 2011. ,