{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:50:21Z","timestamp":1725501021025},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744085"},{"type":"electronic","value":"9783540744092"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74409-2_28","type":"book-chapter","created":{"date-parts":[[2007,8,17]],"date-time":"2007-08-17T11:57:55Z","timestamp":1187351875000},"page":"259-268","source":"Crossref","is-referenced-by-count":5,"title":["Detecting Malicious SQL"],"prefix":"10.1007","author":[{"given":"Jos\u00e9","family":"Fonseca","sequence":"first","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]},{"given":"Henrique","family":"Madeira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Acunetix, available at: http:\/\/www.acunetix.com"},{"key":"28_CR2","unstructured":"Anton, A., Bertino, E., Li, N., Yu, T.: A roadmap for comprehensive online privacy policies. CERIAS Technical Report (2004)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: proc. VLDB (2002)","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"28_CR4","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/11506881_8","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Fredrik Valeur","year":"2005","unstructured":"Valeur, F., Mutz, D., Vigna, G.: A Learning-Based Approach to the Detection of SQL Attacks. In: DIMVA 2005 (2005)"},{"key":"28_CR5","volume-title":"proc. of Third International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems","author":"C. Chung","year":"1999","unstructured":"Chung, C., Gertz, L.: DEMIDS: A Misuse Detection System for Database Systems. In: proc. of Third International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems, Kluwer Academic Publishers, Boston (1999)"},{"key":"28_CR6","unstructured":"Bertino, E., et al.: Intrusion detection in RBAC-administered databases. In: ACSAC 2005 (2005)"},{"key":"28_CR7","unstructured":"Vieira, M., Madeira, H.: Detection of malicious transactions in DBMS. In: PRDC 2005 (2005)"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45853-0_16","volume-title":"Computer Security - ESORICS 2002","author":"S.Y. Lee","year":"2002","unstructured":"Lee, S.Y., Low, W.L., Wong, P.Y.: Learning Fingerprints For A Database Intrusion Detection System. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol.\u00a02502, Springer, Heidelberg (2002)"},{"key":"28_CR9","unstructured":"Low, W.L., Lee, J., Teoh, P.: DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions. In: International Conference on Enterprise Information Systems (2002)"},{"key":"28_CR10","unstructured":"Viega, J., Bloch, J.T., Kohno, Y., McGraw, G.: ITS4: A static vulnerability scanner for C and C++ code. In: Computer Security Applications Conference (2000)"},{"key":"28_CR11","unstructured":"Bergeron, et al.: Static Detection of Malicious Code in Executable Programs. In: SREIS (2001)"},{"key":"28_CR12","unstructured":"Internet Security Systems: Network- vs. Host-based Intrusion Detection (1998)"},{"key":"28_CR13","unstructured":"TPC Benchmark W (2002) available at: http:\/\/www.tpc.org\/tpcw"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74409-2_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:25:18Z","timestamp":1619504718000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74409-2_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744085","9783540744092"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74409-2_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}