Пожалуйста, войдите в систему, чтобы принять участие в дискуссии (добавить собственные рецензию, или комментарий)
Цитировать эту публикацию
%0 Journal Article
%1 noauthororeditor
%A S. Fouzul Hidhaya1, 2
%A Angelina Geetha1, 3
%D 2012
%J International Journal on Cryptography and Information Security (IJCIS)
%K cryptography digital steganography
%N 4
%P 15
%T Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using Input-Data Cleansing Algorithm
%U https://wireilla.com/papers/ijcis/V2N4/2412ijcis08.pdf
%V 2
@article{noauthororeditor,
added-at = {2022-06-15T15:01:27.000+0200},
author = {S. Fouzul Hidhaya1, 2 and Angelina Geetha1, 3},
biburl = {https://www.bibsonomy.org/bibtex/294feec62ad5f3447e73c907809fd23d8/alinta},
interhash = {401db9efa5fa4492ec609410d5a7f320},
intrahash = {94feec62ad5f3447e73c907809fd23d8},
journal = {International Journal on Cryptography and Information Security (IJCIS)},
keywords = {cryptography digital steganography},
language = {English},
number = 4,
pages = 15,
timestamp = {2022-06-15T15:01:27.000+0200},
title = {Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using Input-Data Cleansing Algorithm
},
url = {https://wireilla.com/papers/ijcis/V2N4/2412ijcis08.pdf},
volume = 2,
year = 2012
}