2013 5th International Conference on Computer Science and Information Technology 2013
DOI: 10.1109/csit.2013.6588759
|View full text |Cite
|
Sign up to set email alerts
|

Database security threats: A survey study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(20 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…N.A. Al Sayid and D. Aldlaeen [6], introduced a firewall technique to obstruct the SQL injection attack. A.Shastri and P.N.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…N.A. Al Sayid and D. Aldlaeen [6], introduced a firewall technique to obstruct the SQL injection attack. A.Shastri and P.N.…”
Section: Literature Reviewmentioning
confidence: 99%
“…N.A. Al Sayid and D. Aldlaeen [8], proposed access control policy for user authentication and identification.P. Ghorbanzadeh et al [9], introduced firewall and virtual private for the prevention of unwanted intrusion on mobile database.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Kamtuo and Soomlek [7] introduced SQL injection commands dataset extraction, pre-processing, and usage of machine learning model analysis for detection, testing, and training. Al-Sayid and Aldlaeen [8] introduced the use of a web application firewall. However, these initiatives have common drawbacks; it does not have node verified signature.…”
Section: Introductionmentioning
confidence: 99%
“…[5] proposed system provides better secure communication, Sybil attack detection, secure data aggregation and resilience against node capture attacks and replication attacks. AlSayid, N, et.al (2013) [6] represents databases must be secured well than any other systems in the organization. They allow data to be retained and shared electronically and the amount of data contained in these systems continues to grow at an exponential rate.…”
Section: Genetic Algorithmmentioning
confidence: 99%