Year and Author | Title And Source | Assistance | Issue Resolved |
[12] | Identifying and averting attacks using code injection. Scholar Commons at University of South Florida | A technique that prevents CIAOs through optimization (for applications where the program language output has an LR (K) grammar where each closed value corresponds to a syntactic category) | Attacks using code injection |
[12] | Thorough analysis of the research on SQL injection attacks, 2016(26?35), International Journal of Soft Computing 11(1), ISSN: 1816?9503. | A systematic literature review (SLR) on SQL injection attacks was conducted using the kitchen hams technique. | SQLI identification and mitigation |
[13] | Injection of commands. University of Ottawa’s School of Information Technology and Engineering, Ontario, Canada, kin 6N5 | An overview of typical injection attacks | a list of frequent injection attacks |
[14] | Evaluation of statistical tools for identifying security holes in the source code of Java and C/C++ programs at the University of Ontario Institute of Technology’s Department of Electrical, Computer, and Software Engineering, Oshawa, ON, Canada. | The source codes for C/C++ and Java are examined for errors and vulnerabilities. | Assessing the instruments used for code analysis. |