{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T22:42:57Z","timestamp":1749249777559},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242671"},{"type":"electronic","value":"9783030242688"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24268-8_3","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:03:34Z","timestamp":1563390214000},"page":"25-34","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Moving Target Defense in Preventing SQL Injection"],"prefix":"10.1007","author":[{"given":"Kaiyu","family":"Feng","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Dequan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"3","key":"3_CR1","first-page":"381","volume":"56","author":"H Zhang","year":"2018","unstructured":"Zhang, H., Yi, Y., Wang, J., Cao, N., Duan, Q.: Network security situation awareness framework based on threat intelligence. CMC: Comput. Mater. Continua 56(3), 381\u2013399 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Qbea\u2019h, M., Alshraideh, M., Sabri, K.E.: Detecting and preventing SQL injection attacks: a formal approach. In: 2016 Cybersecurity and Cyberforensics Conference (CCC) (2016)","DOI":"10.1109\/CCC.2016.26"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Yeole, A.S., Meshram, B.B.: Analysis of different techniques for detection of SQL injection. Association for Computing Machinery, Mumbai, India (2011)","DOI":"10.1145\/1980022.1980229"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Wei, K., Muthuprasanna, M., Kothari, S.: Preventing SQL injection attacks in stored procedures. In: Australian Software Engineering Conference (ASWEC 2006) (2006)","DOI":"10.1109\/ASWEC.2006.40"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1155\/2017\/3825373","volume":"2017","author":"AK Dalai","year":"2017","unstructured":"Dalai, A.K., Jena, S.K.: Neutralizing SQL injection attack using server side code modification in web applications. Secur. Commun. Netw. 2017, 12 (2017)","journal-title":"Secur. Commun. Netw."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Ping, C.: A second-order SQL injection detection method. In: 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (2017)","DOI":"10.1109\/ITNEC.2017.8285104"},{"issue":"1","key":"3_CR7","first-page":"98","volume":"27","author":"HAN Chen-Wang","year":"2018","unstructured":"Chen-Wang, H.A.N., Hui, L.I.N., et al.: SQL injection filtering method based on proxy mode. Comput. Syst. Appl. 27(1), 98\u2013105 (2018)","journal-title":"Comput. Syst. Appl."},{"issue":"11","key":"3_CR8","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1631\/FITEE.1601321","volume":"17","author":"GL Cai","year":"2016","unstructured":"Cai, G.L., et al.: Moving target defense: state of the art and characteristics. Front. Inf. Technol. Electron. Eng. 17(11), 1122\u20131153 (2016)","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"3_CR9","unstructured":"Okhravi, H., Streilein, W.W., Bauer, K.S.: Moving target techniques: leveraging uncertainty for cyber defense. Lincoln Lab. J. 22, 1 (2016)"},{"key":"3_CR10","unstructured":"Cox, B., et al.: N-variant systems: a secretless framework for security through diversity. In: Proceedings of the 15th Conference on USENIX Security Symposium, vol. 15. USENIX Association, Vancouver (2006)"},{"issue":"4","key":"3_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.145","volume":"9","author":"Quyen Nguyen","year":"2011","unstructured":"Nguyen, Q., Sood, A.: A comparison of intrusion-tolerant system architectures. IEEE Secur. Privacy 9(4), 24\u201331 (2011)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Yuan, E., Malek, S.: A taxonomy and survey of self-protecting software systems. In: SEAMS 2012, Z\u00fcrich, Switzerland (2012)","DOI":"10.1109\/SEAMS.2012.6224397"},{"issue":"04","key":"3_CR13","first-page":"453","volume":"1","author":"L Yang","year":"2015","unstructured":"Yang, L., et al.: Performance assessment technique of moving target defense based on attack surface measurement. J. Command Control 1(04), 453\u2013457 (2015)","journal-title":"J. Command Control"},{"issue":"2","key":"3_CR14","first-page":"273","volume":"56","author":"X Xie","year":"2018","unstructured":"Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. CMC: Comput. Mater. Continua 56(2), 273\u2013283 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Huang, R., Zhang, H., Liu, Y., et al.: RELOCATE: a container based moving target defense approach. In: 7th International Conference on Computer Engineering and Networks (2017)","DOI":"10.22323\/1.299.0008"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24268-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:04:43Z","timestamp":1563390283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24268-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242671","9783030242688"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24268-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}