Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks
With the evolution of web technologies, many businesses have decided to attract more clients through the online market, also called e-commerce. While numerous web applications exist, a significant portion remains susceptible to cyberattacks. Of these, Structured Query Language (SQL) injection attack...
Published in: | 8th International Conference on Recent Advances and Innovations in Engineering: Empowering Computing, Analytics, and Engineering Through Digital Innovation, ICRAIE 2023 |
---|---|
Main Author: | Ibrahim R.Y.; Rosli M.M. |
Format: | Conference paper |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2023
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85189931131&doi=10.1109%2fICRAIE59459.2023.10468295&partnerID=40&md5=d8f51b0881c397c1863a4dd0369293a7 |
Similar Items
-
Analysis of Web Vulnerability Using Open-Source Scanners on Different Types of Small Entrepreneur Web Applications in Malaysia
by: Buja A.G.; Low N.N.M.A.A.; Zolkeplay A.F.; Azam N.A.; Isa F.M.
Published: (2024) -
Taxonomy of C overflow vulnerabilities attack
by: Ahmad N.H.; Aljunid S.A.; Ab Manan J.-L.
Published: (2011) -
The Development of a Web-Based Student Support System Using Java Server Pages and MySQL
by: M. Razif J.,.M.; Aisar M.M.I.; Fauzi S.S.M.; M. Nabil F.J.; Gining R.A.J.M.; Suali A.J.; Sobri W.A.W.M.
Published: (2020) -
MySQL database for storage of fingerprint data
by: Naim N.F.; Mohd Yassin A.I.; Zamri W.M.A.W.; Sarnin S.S.
Published: (2011) -
Terrestrial laser scanner self-calibration: Quantitative evaluation of minimum network configuration
by: Salleh S.M.; Azmi M.A.A.M.; Abbas M.A.; Mustafar M.A.; Hashim N.M.; Sulaiman S.A.; Salleh C.S.
Published: (2021)