{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:26:53Z","timestamp":1771518413414,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/icccnt49239.2020.9225575","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T20:00:38Z","timestamp":1602792038000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Code-based Analysis Approach to Detect and Prevent SQL Injection Attacks"],"prefix":"10.1109","author":[{"given":"Angshuman","family":"Jana","sequence":"first","affiliation":[]},{"given":"Dipendu","family":"Maity","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516696"},{"key":"ref32","first-page":"18","article-title":"Finding security vulnerabilities in java applications with static analysis","author":"livshits","year":"2005","journal-title":"Proc of the 14th Conference on USENIX Security Symposium - Volume 14 USENIX Association"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062487"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24369-6_22"},{"key":"ref37","year":"0","journal-title":"GotoCode"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103678"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1108473.1108496"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111070"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.21"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/11663812_7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775174"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511498"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2650-5_4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2014.7054849"},{"key":"ref16","first-page":"381","article-title":"A symbolic model checker for database programs","author":"jana","year":"2018","journal-title":"ICSOFT"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101935"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25660-1_20"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11506881_8"},{"key":"ref28","first-page":"217","author":"su","year":"2018","journal-title":"Research on sql injection vulnerability attack model"},{"key":"ref4","article-title":"A Classification of SQL-Injection Attacks and Countermeasures","author":"halfond","year":"2006","journal-title":"IEEE International Symposium on Secure Software Engineering"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1850","DOI":"10.35940\/ijitee.J9225.0881019","article-title":"Suitability of influxdb database for iot applications","volume":"8","author":"nasar","year":"2019","journal-title":"International Journal of Innovative Technology and Exploring Engineering"},{"key":"ref3","author":"elmasri","year":"2016","journal-title":"Fundamentals of Database Systems"},{"key":"ref6","article-title":"Extending abstract interpretation to dependency analysis of database applications","author":"jana","year":"2018","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083250"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49175-1_2"},{"key":"ref8","year":"0","journal-title":"State of the internet\/security 2020 report"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.183"},{"key":"ref2","author":"date","year":"2006","journal-title":"An Introduction to Database Systems"},{"key":"ref9","author":"clarke","year":"2009","journal-title":"SQL Injection Attacks and Defense"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IDEAS.2004.1319786"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317494"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2008.89"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988679"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698754"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49806-5_8"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2016.03.026"}],"event":{"name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","location":"Kharagpur, India","start":{"date-parts":[[2020,7,1]]},"end":{"date-parts":[[2020,7,3]]}},"container-title":["2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9211590\/9225262\/09225575.pdf?arnumber=9225575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:18:30Z","timestamp":1656375510000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9225575\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/icccnt49239.2020.9225575","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}