S. Ansari, SQL Injection in Oracle: An exploration of vulnerabilities, International Journal on Computer Science and Engineering, pp.522-531, 2012.

A. Tajpour, M. Massrum, and M. Z. Heydari, Comparison of SQL Injection Detection and Prevention Techniques, 2nd International Conforence on Education Technology and Computer (ICETC), 2010.

C. Kruegel and G. Vigna, Anomaly detection of web-based attacks, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, p.251261, 2003.
DOI : 10.1145/948109.948144

G. Halfond and A. Orso, AMNESIA, Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering , ASE '05, pp.174-183, 2005.
DOI : 10.1145/1101908.1101935

S. W. Boyd and A. D. Keromytis, SQLrand: Preventing SQL Injection Attacks, Proceedings of the 2nd Applied Cryptography and Network Security (ACNS) Conference, pp.292-302, 2004.
DOI : 10.1007/978-3-540-24852-1_21

I. Ristic, ModSecurity Handbook: The Complete Guide to the Popular Open Source Web Application Firewall, Feisty Duck Ltd Edition, vol.ISBN, 2010.

C. P. Robert, L. Choix-baysien-androutsopoulos-l, J. Koutsias, K. Y. Chandrinos, G. Paliouras et al., Principes et pratiques An Evaluation of Naive Bayesian Anti-Spam Filtering, Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning, p.917, 2000.

R. Komiya and M. Incheon-paik-hisada, CJassification of malicious web code by machine learning, OII 3rd International Conference, 2011.