{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T05:08:45Z","timestamp":1768108125392,"version":"3.49.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/icca49400.2020.9022833","type":"proceedings-article","created":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T14:19:07Z","timestamp":1583504347000},"page":"1-6","source":"Crossref","is-referenced-by-count":37,"title":["A Detection and Prevention Technique on SQL Injection Attacks"],"prefix":"10.1109","author":[{"given":"Zar Chi Su Su","family":"Hlaing","sequence":"first","affiliation":[]},{"given":"Myo","family":"Khaing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"5","article-title":"Detection and Prevention of SQL Injection Attack: A Survey","volume":"6","author":"alwan","year":"2017","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2017.V9.1165"},{"key":"ref12","author":"kilaru","year":"2017","journal-title":"Improving Techniques for SQL Injection Defenses"},{"key":"ref13","article-title":"Detection and Prevention of SQL Injection Attack by Dynamic Analyzer and Testing Model","volume":"8","author":"nadeem","year":"2017","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"ref14","author":"halfond","year":"0","journal-title":"A Survey of SQL Injection Attack Detection and Prevention"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i2.31.13388"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5121\/ijdms.2014.6102"},{"key":"ref4","first-page":"374","article-title":"Detection and Prevention of SQL Injection Attack","volume":"5","author":"kumar","year":"2014","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"ref3","first-page":"699","article-title":"SQL Injection Attacks and Defensive Techniques","volume":"5","author":"shettar","year":"2014","journal-title":"International Journal of Computer Applications in Technology"},{"key":"ref6","first-page":"22405","article-title":"A Study on SQL Injection Techniques","volume":"8","author":"rubidhadevi","year":"2016","journal-title":"Int J Pharm Tech"},{"key":"ref5","first-page":"97","article-title":"Use of Query Tokenization to Detect and Prevent SQL Injection Attacks","volume":"2","author":"kumar","year":"2015","journal-title":"Int J Eng Sci Technol"},{"key":"ref8","first-page":"316","article-title":"Inferential SQL Injection Attacks","volume":"18","author":"?tamper","year":"2016","journal-title":"International Journal of Network Security"},{"key":"ref7","first-page":"1","article-title":"An Approach for Preventing SQL Injection Attack on Web Application","volume":"5","author":"gupta","year":"2016","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.850"},{"key":"ref1","first-page":"438","article-title":"Use of Query tokenization to detect and prevent SQLinjection attacks","author":"lambert","year":"2010","journal-title":"Proceedings of the 3rd International Conference on Computer Science and Information Technology (ICCSIT)"},{"key":"ref9","first-page":"176","article-title":"Case Study of SQL Injection Attacks","author":"sonakshi","year":"2016","journal-title":"J Eng Sci Technol Res"}],"event":{"name":"2020 IEEE Conference on Computer Applications (ICCA)","location":"Yangon, Myanmar","start":{"date-parts":[[2020,2,27]]},"end":{"date-parts":[[2020,2,28]]}},"container-title":["2020 IEEE Conference on Computer Applications(ICCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9007008\/9022807\/09022833.pdf?arnumber=9022833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:09:11Z","timestamp":1656374951000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9022833\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icca49400.2020.9022833","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}