[go: up one dir, main page]

Singh et al., 2014 - Google Patents

A review report on security threats on database

Singh et al., 2014

Document ID
5140489628157522531
Author
Singh S
Rai R
Publication year
Publication venue
International Journal of Computer Science and Information Technologies

External Links

Continue reading at scholar.google.com (other versions)

Similar Documents

Publication Publication Date Title
Mousa et al. Database security threats and challenges
Kulkarni et al. Review of attacks on databases and database security techniques
Yunus et al. Review of SQL injection: problems and prevention
Teimoor A review of database security concepts, risks, and problems
Al-Sayid et al. Database security threats: A survey study
Singh et al. A review report on security threats on database
CN118631552B (en) A computer network security protection method
WO2021046637A1 (en) Methods and systems for data self-protection
US10339325B2 (en) Multi-level security model for securing access to encrypted private data
Jain et al. A relative study on different database security threats and their security techniques
Sarmah Database Security–Threats & Prevention
Naguib et al. Database security: Current challenges and effective protection strategies
Deepika Database security: Threats and security techniques
Pan et al. Analysis of database security
Asmawi et al. System architecture for SQL injection and insider misuse detection system for DBMS
Gharpure et al. Vulnerabilities and threat management in relational database management systems
Lesov Database Security: A Historical Perspective
Iordache Database–Web Interface Vulnerabilities
LAWAL et al. Contemporary Control Measures for Mitigating Threats and Vulnerabilities to organizational Databases
Kaur A review on database security
Konda et al. Augmenting data warehouse security techniques-a selective survey
Furmanyuk et al. Modern approaches to the database protection
Busłowska et al. The Analysis of Potential Threats to Information Systems and Countermeasures
Prasanna Maintaining Privacy of Healthcare Data by using Machine Learning
Pfleeger Data security