Singh et al., 2014 - Google Patents
A review report on security threats on databaseSingh et al., 2014
- Document ID
- 5140489628157522531
- Author
- Singh S
- Rai R
- Publication year
- Publication venue
- International Journal of Computer Science and Information Technologies
External Links
- 230000001010 compromised 0 abstract description 2
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mousa et al. | Database security threats and challenges | |
Kulkarni et al. | Review of attacks on databases and database security techniques | |
Yunus et al. | Review of SQL injection: problems and prevention | |
Teimoor | A review of database security concepts, risks, and problems | |
Al-Sayid et al. | Database security threats: A survey study | |
Singh et al. | A review report on security threats on database | |
CN118631552B (en) | A computer network security protection method | |
WO2021046637A1 (en) | Methods and systems for data self-protection | |
US10339325B2 (en) | Multi-level security model for securing access to encrypted private data | |
Jain et al. | A relative study on different database security threats and their security techniques | |
Sarmah | Database Security–Threats & Prevention | |
Naguib et al. | Database security: Current challenges and effective protection strategies | |
Deepika | Database security: Threats and security techniques | |
Pan et al. | Analysis of database security | |
Asmawi et al. | System architecture for SQL injection and insider misuse detection system for DBMS | |
Gharpure et al. | Vulnerabilities and threat management in relational database management systems | |
Lesov | Database Security: A Historical Perspective | |
Iordache | Database–Web Interface Vulnerabilities | |
LAWAL et al. | Contemporary Control Measures for Mitigating Threats and Vulnerabilities to organizational Databases | |
Kaur | A review on database security | |
Konda et al. | Augmenting data warehouse security techniques-a selective survey | |
Furmanyuk et al. | Modern approaches to the database protection | |
Busłowska et al. | The Analysis of Potential Threats to Information Systems and Countermeasures | |
Prasanna | Maintaining Privacy of Healthcare Data by using Machine Learning | |
Pfleeger | Data security |