{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:48Z","timestamp":1725902928432},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_27","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T08:02:27Z","timestamp":1499155347000},"page":"286-295","source":"Crossref","is-referenced-by-count":2,"title":["A Two-Tiered Defence of Techniques to Prevent SQL Injection Attacks"],"prefix":"10.1007","author":[{"given":"Yan","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Guidong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhiquan","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Boya","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Yongjun","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"27_CR1","unstructured":"Anley: Advanced SQL Injection in SQL Server Applications. Next Generation Security Software LTD. White Paper (2002)"},{"key":"27_CR2","unstructured":"Sun, W., Manber U.: A Fast Algorithm for Multi-pattern Searching. Technical report 94-17, University of Arizona at Tuscon (1994)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Bertino, E., Kamra, A., Early, J.: Profiling database application to detect SQL injection attacks, San Diego, California, USA (2007)","DOI":"10.1109\/PCCC.2007.358926"},{"key":"27_CR4","unstructured":"Amutha, M., Kartikeyan, M., Marimuthu, K.: An efficient technique for preventing Sql injection attack using pattern matching algorithm. In: International Conference on Emerging Trends in Computing, Communication and Nanotechnology, Nassau, Bahamas (2013)"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Halfond, W., Orso, A.: AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. In: IEEE\/ACM International Conference on Automated Engineering (ASE), Long Beach, California, USA, pp. 174\u2013183 (2005)","DOI":"10.1145\/1101908.1101935"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Halfond, W.G.J., Orso, A.: Combining static analysis and runtime monitoring to counter SQL injection attacks. In: 3rd International Workshop on Dynamic Analysis, St. Louis, Missouri, USA, pp. 1\u20137 (2005)","DOI":"10.1145\/1083246.1083250"},{"key":"27_CR7","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1145\/360825.360855","volume":"18","author":"AV Aho","year":"1975","unstructured":"Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Commun. ACM 18, 333\u2013340 (1975). St. Louis, Missouri","journal-title":"Commun. ACM"},{"key":"27_CR8","unstructured":"Millham, R., Dogbe, E., Singh, P.: Role and data-based constraints of data access control in a legacy system migration to a service-oriented environment. In: International Proceedings of Computer Science and Information Technology (2012)"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T08:14:00Z","timestamp":1499156040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_27","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}