[1]
J. K. Chowdhury, D. K. Yadav, and C. M. P.V.S.S.R, “SQL Injection Attack Detection Based on Similarity Matching Between Vectors Extracted From Design Time and Run-Time Queries”, IJERR, vol. 42, pp. 1–17, Aug. 2024.