SQL Injection in Oracle: An exploration of vulnerabilities, International Journal on Computer Science and Engineering, pp.522-531, 2012. ,
Comparison of SQL Injection Detection and Prevention Techniques, 2nd International Conforence on Education Technology and Computer (ICETC), 2010. ,
Anomaly detection of web-based attacks, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, p.251261, 2003. ,
DOI : 10.1145/948109.948144
AMNESIA, Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering , ASE '05, pp.174-183, 2005. ,
DOI : 10.1145/1101908.1101935
SQLrand: Preventing SQL Injection Attacks, Proceedings of the 2nd Applied Cryptography and Network Security (ACNS) Conference, pp.292-302, 2004. ,
DOI : 10.1007/978-3-540-24852-1_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4549
ModSecurity Handbook: The Complete Guide to the Popular Open Source Web Application Firewall, Feisty Duck Ltd Edition, vol.ISBN, 2010. ,
Arkoon Network Security), un langage orient rseaux et scurit, Symposium sur la scurit des technologies de l'information et des communications, 2014. ,
Principes et pratiques, 2006. ,
An Evaluation of Naive Bayesian Anti-Spam Filtering, Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning, p.917, 2000. ,
Classification of malicious web code by machine learning, 2011 3rd International Conference on Awareness Science and Technology (iCAST), 2011. ,
DOI : 10.1109/ICAwST.2011.6163109