S. Ansari, SQL Injection in Oracle: An exploration of vulnerabilities, International Journal on Computer Science and Engineering, pp.522-531, 2012.

A. Tajpour, M. Massrum, and M. Z. Heydari, Comparison of SQL Injection Detection and Prevention Techniques, 2nd International Conforence on Education Technology and Computer (ICETC), 2010.

C. Kruegel and G. Vigna, Anomaly detection of web-based attacks, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, p.251261, 2003.
DOI : 10.1145/948109.948144

W. G. Halfond and A. Orso, AMNESIA, Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering , ASE '05, pp.174-183, 2005.
DOI : 10.1145/1101908.1101935

S. W. Boyd and A. D. Keromytis, SQLrand: Preventing SQL Injection Attacks, Proceedings of the 2nd Applied Cryptography and Network Security (ACNS) Conference, pp.292-302, 2004.
DOI : 10.1007/978-3-540-24852-1_21

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4549

I. Ristic, ModSecurity Handbook: The Complete Guide to the Popular Open Source Web Application Firewall, Feisty Duck Ltd Edition, vol.ISBN, 2010.

K. Denis, P. Sylvain-desse, and M. Talbi, Arkoon Network Security), un langage orient rseaux et scurit, Symposium sur la scurit des technologies de l'information et des communications, 2014.

C. P. Robert and L. Choix-baysien, Principes et pratiques, 2006.

I. Androutsopoulos, J. Koutsias, K. V. Chandrinos, G. Paliouras, and C. D. Spyropoulos, An Evaluation of Naive Bayesian Anti-Spam Filtering, Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning, p.917, 2000.

R. Komiya and M. Incheon-paik-hisada, Classification of malicious web code by machine learning, 2011 3rd International Conference on Awareness Science and Technology (iCAST), 2011.
DOI : 10.1109/ICAwST.2011.6163109