Пожалуйста, войдите в систему, чтобы принять участие в дискуссии (добавить собственные рецензию, или комментарий)
Цитировать эту публикацию
%0 Journal Article
%1 noauthororeditor
%A Hidhaya, S. Fouzul
%A Geetha, Angelina
%D 2022
%J International Journal on Cryptography and Information Security (IJCIS)
%K cryptography
%N 4
%P 64-81
%T Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using Input-Data Cleansing Algorithm
%U https://wireilla.com/papers/ijcis/V2N4/2412ijcis08.pdf
%V 2
@article{noauthororeditor,
added-at = {2022-08-04T12:41:31.000+0200},
author = {Hidhaya, S. Fouzul and Geetha, Angelina},
biburl = {https://www.bibsonomy.org/bibtex/2af80bba7be5896dd7193c2a1698c27a6/alinta},
interhash = {46cbbcdfcb1eb297b5403f632eb28459},
intrahash = {af80bba7be5896dd7193c2a1698c27a6},
journal = {International Journal on Cryptography and Information Security (IJCIS)},
keywords = {cryptography},
language = {English},
month = {December},
number = 4,
pages = {64-81},
timestamp = {2022-08-04T12:41:31.000+0200},
title = {Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using Input-Data Cleansing Algorithm},
url = {https://wireilla.com/papers/ijcis/V2N4/2412ijcis08.pdf},
volume = 2,
year = 2022
}