Journal articles on the topic 'SQLIVS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SQLIVS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Berry, Donna L., Brent A. Blumenstein, Barbara Halpenny, Seth Wolpin, Jesse R. Fann, Mary Austin-Seymour, Nigel Bush, Bryant T. Karras, William B. Lober, and Ruth McCorkle. "Enhancing Patient-Provider Communication With the Electronic Self-Report Assessment for Cancer: A Randomized Trial." Journal of Clinical Oncology 29, no. 8 (March 10, 2011): 1029–35. http://dx.doi.org/10.1200/jco.2010.30.3909.
Full textFu, Houlong, Chun Guo, Chaohui Jiang, Yuan Ping, and Xiaodan Lv. "SDSIOT: An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic." Electronics 12, no. 11 (May 30, 2023): 2472. http://dx.doi.org/10.3390/electronics12112472.
Full textSun, San-Tsai, and Konstantin Beznosov. "Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks." International Journal of Secure Software Engineering 1, no. 1 (January 2010): 20–40. http://dx.doi.org/10.4018/jsse.2010102002.
Full textAblahd, Ann, and Suhair Dawwod. "Using Flask for SQLIA Detection and Protection." Tikrit Journal of Engineering Sciences 27, no. 2 (May 15, 2020): 1–14. http://dx.doi.org/10.25130/tjes.27.2.01.
Full textGaffney, Kevin P., Martin Prammer, Larry Brasfield, D. Richard Hipp, Dan Kennedy, and Jignesh M. Patel. "SQLite." Proceedings of the VLDB Endowment 15, no. 12 (August 2022): 3535–47. http://dx.doi.org/10.14778/3554821.3554842.
Full textAteeq Mohammed Draib, Najla’a, Abu Bakar Md Sultan, Abdul Azim B Abd Ghani, and Hazura Zulzalil. "Comparison of Security Testing Approaches for Detection of SQL Injection Vulnerabilities." International Journal of Engineering & Technology 7, no. 4.1 (September 12, 2018): 14. http://dx.doi.org/10.14419/ijet.v7i4.1.19483.
Full textAdinata, Putu Gio Satria, I. Putu Wira Pratama Putra, Ni Putu Adinda Indah Juliantari, and Ketut Dita Ari Sutrisna. "Analisis Perbandingan Tools SQL Injection Menggunakan SQLmap, SQLsus dan The Mole." Informatik : Jurnal Ilmu Komputer 18, no. 3 (December 28, 2022): 286. http://dx.doi.org/10.52958/iftk.v18i3.5373.
Full textLee, Eunji. "Taming Performance Variability of Healthcare Data Service Frameworks with Proactive and Coarse-Grained Memory Cleaning." International Journal of Environmental Research and Public Health 16, no. 17 (August 26, 2019): 3096. http://dx.doi.org/10.3390/ijerph16173096.
Full textDharmalingam, Jeya Mala, and M. Eswaran. "An Agent Based Intelligent Dynamic Vulnerability Analysis Framework for Critical SQLIA Attacks." International Journal of Intelligent Information Technologies 14, no. 3 (July 2018): 56–82. http://dx.doi.org/10.4018/ijiit.2018070104.
Full textNidhal, Fyrooz, Hiba Naser R N, Nahida Abdul Latheef, Shahsitha Siddique V, Yomna Kalam A V, and Neethu Prabhakaran P. "SQLIAD – A Hazard to Web Applications." International Journal of Computer Trends and Technology 29, no. 1 (November 25, 2015): 15–18. http://dx.doi.org/10.14445/22312803/ijctt-v29p103.
Full textWang, Yongzhi, Yulong Shen, Cuicui Su, Jiawen Ma, Lingtong Liu, and Xuewen Dong. "CryptSQLite: SQLite With High Data Security." IEEE Transactions on Computers 69, no. 5 (May 1, 2020): 666–78. http://dx.doi.org/10.1109/tc.2019.2963303.
Full textWinslett, Marianne, and Vanessa Braganholo. "Richard Hipp Speaks Out on SQLite." ACM SIGMOD Record 48, no. 2 (December 19, 2019): 39–46. http://dx.doi.org/10.1145/3377330.3377338.
Full textLi, Jian Wei, Hong Guo, and Yu Bin Xu. "Research on Optimization of SQLite Indexing Mechanism Based on Red-Black Tree." Applied Mechanics and Materials 220-223 (November 2012): 2711–15. http://dx.doi.org/10.4028/www.scientific.net/amm.220-223.2711.
Full textSebastian, Anu, Richa Kuriakose, and Surekha Mariam Varghese. "NEO4J, SQLITE and MYSQL for Hospital Localization." Advanced Computing: An International Journal 7, no. 3 (May 30, 2016): 29–36. http://dx.doi.org/10.5121/acij.2016.7303.
Full textNemetz, Sebastian, Sven Schmitt, and Felix Freiling. "A standardized corpus for SQLite database forensics." Digital Investigation 24 (March 2018): S121—S130. http://dx.doi.org/10.1016/j.diin.2018.01.015.
Full textZhang, Li, Shengang Hao, and Quanxin Zhang. "Recovering SQLite data from fragmented flash pages." Annals of Telecommunications 74, no. 7-8 (February 20, 2019): 451–60. http://dx.doi.org/10.1007/s12243-019-00707-9.
Full textLiu, Jun Lin, and Qi Yuan Sun. "Information Processing Based on SQLite for Target Tracking System." Applied Mechanics and Materials 278-280 (January 2013): 2065–68. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.2065.
Full textLashkaripour, Zeinab, and Abbas Ghaemi Bafghi. "A Simple and Fast Technique for Detection and Prevention of SQL Injection Attacks (SQLIAs)." International Journal of Security and Its Applications 7, no. 5 (September 30, 2013): 53–66. http://dx.doi.org/10.14257/ijsia.2013.7.5.05.
Full textZhu, Alex, and Wei Qi Yan. "Exploring Defense of SQL Injection Attack in Penetration Testing." International Journal of Digital Crime and Forensics 9, no. 4 (October 2017): 62–71. http://dx.doi.org/10.4018/ijdcf.2017100106.
Full textDatsko, Oleh, and Elżbieta Miłosz. "Performance comparison between Xamarin and Java database operations." Journal of Computer Sciences Institute 7 (September 30, 2018): 168–71. http://dx.doi.org/10.35784/jcsi.672.
Full textKar, Debabrata, Suvasini Panigrahi, and Srikanth Sundararajan. "SQLiDDS: SQL injection detection using document similarity measure." Journal of Computer Security 24, no. 4 (August 16, 2016): 507–39. http://dx.doi.org/10.3233/jcs-160554.
Full textNana Mbinkeu, Rodrigue Carlos, and Bernabé Batchakui. "Reducing Disk Storage with SQLite into BitCoin Architecture." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 3, no. 2 (May 12, 2015): 10. http://dx.doi.org/10.3991/ijes.v3i2.4490.
Full textBharadwaj, Y. V. Sai, Sai Bhageerath Yarrapatruni, and Dr Prasada Rao YVSSSV. "SQLite Database and its Application on Embedded Platform." International Journal of Computer Trends and Technology 67, no. 2 (February 25, 2019): 1–6. http://dx.doi.org/10.14445/22312803/ijctt-v67i2p101.
Full textPark, Jong-Hyeok, Gihwan Oh, and Sang-Won Lee. "SQL statement logging for making SQLite truly lite." Proceedings of the VLDB Endowment 11, no. 4 (December 2017): 513–25. http://dx.doi.org/10.1145/3186728.3164146.
Full textWinasis, Persis Haryo, Raga Maulana, and Yodi Susanto. "Designing Application For Defect Recording and Handover Of Property Based On Mobile Application by Applying SQLite Technology." CCIT Journal 13, no. 2 (August 27, 2020): 185–95. http://dx.doi.org/10.33050/ccit.v13i2.990.
Full textShin, Jiho, and Jung-Taek Seo. "Verification of Privacy Protection Reliability through Mobile Forensic Approach Regarding iOS-Based Instant Messenger." Sustainability 14, no. 20 (October 15, 2022): 13281. http://dx.doi.org/10.3390/su142013281.
Full textHARIANI, HARIANI. "EKSPLORASI WEB BROWSER DALAM PENCARIAN BUKTI DIGITAL MENGGUNAKAN SQLITE." Jurnal INSTEK (Informatika Sains dan Teknologi) 6, no. 1 (January 6, 2021): 66. http://dx.doi.org/10.24252/instek.v6i1.18638.
Full textPetráš, Václav. "Implementation of SQLite database support in program gama-local." Geoinformatics FCE CTU 7 (December 29, 2011): 73–84. http://dx.doi.org/10.14311/gi.7.6.
Full textWang, Gang, and Ming Yu Zhao. "Study and Optimization of Database on Android Platform." Applied Mechanics and Materials 263-266 (December 2012): 1754–58. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.1754.
Full textPutra, Raden Bagus Dimas, Eko Setia Budi, and Abdul Rahman Kadafi. "Perbandingan Antara SQLite, Room, dan RBDLiTe Dalam Pembuatan Basis Data pada Aplikasi Android." JURIKOM (Jurnal Riset Komputer) 7, no. 3 (June 14, 2020): 376. http://dx.doi.org/10.30865/jurikom.v7i3.2161.
Full textFeng, Xing Li, Zhi Hai Suo, Yao Tang Wei, and Mo Xu. "The Financial Management System Based on Android and SQLite." Applied Mechanics and Materials 462-463 (November 2013): 974–77. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.974.
Full textImam Farisi, Mukhaimy Gazali, and Rudy Anshari. "SQLite Sebagai Pengganti Lucene.Net pada Pencarian Produk Toko Online." Jurnal CoSciTech (Computer Science and Information Technology) 1, no. 2 (October 31, 2020): 36–43. http://dx.doi.org/10.37859/coscitech.v1i2.2204.
Full textKabakuş, Abdullah Talha. "Pratik Açıdan SQLite ve Firebase Veritabanlarının Bir Performans Karşılaştırması." Düzce Üniversitesi Bilim ve Teknoloji Dergisi 7, no. 1 (January 31, 2019): 314–25. http://dx.doi.org/10.29130/dubited.441672.
Full textOh, Gihwan, Sangchul Kim, Sang-Won Lee, and Bongki Moon. "SQLite optimization with phase change memory for mobile applications." Proceedings of the VLDB Endowment 8, no. 12 (August 2015): 1454–65. http://dx.doi.org/10.14778/2824032.2824044.
Full textBorovskoy, I. G., E. A. Shelmina, and N. V. Zarikovskaya. "Text Data Storage Method Modification for SQLite Relational Database." Journal of Physics: Conference Series 803 (January 2017): 012025. http://dx.doi.org/10.1088/1742-6596/803/1/012025.
Full textJeon, Sangjun, Jewan Bang, Keunduck Byun, and Sangjin Lee. "A recovery method of deleted record for SQLite database." Personal and Ubiquitous Computing 16, no. 6 (July 24, 2011): 707–15. http://dx.doi.org/10.1007/s00779-011-0428-7.
Full textChoi, Jin-oh. "Implementation and Experiment for Search Performance Analysis of SQLite Mobile Database." Journal of the Korea Institute of Information and Communication Engineering 21, no. 2 (February 28, 2017): 333–38. http://dx.doi.org/10.6109/jkiice.2017.21.2.333.
Full textAbogaa, Jennifer Bagulaya. "e-recognition of Motorbike License Plate using Python and SQLite." Indian Journal Of Science And Technology 15, no. 48 (December 27, 2022): 2757–64. http://dx.doi.org/10.17485/ijst/v15i48.1673.
Full textZhou, Bing. "Analysis of the Security Mechanism of Android and Countermeasures." Applied Mechanics and Materials 687-691 (November 2014): 2948–51. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2948.
Full textQin, Lu, Jeffrey Xu Yu, and Lijun Chang. "Ten thousand SQLs." Proceedings of the VLDB Endowment 3, no. 1-2 (September 2010): 58–69. http://dx.doi.org/10.14778/1920841.1920854.
Full textBhagat, Siddhesh, R. R. Sedamkar, and Prachi Janrao. "Preventing SQLIA using ORM Tool with HQL." International Journal of Applied Information Systems 11, no. 4 (September 6, 2016): 44–47. http://dx.doi.org/10.5120/ijais2016451600.
Full textKumar, Pankaj, and C. P. Katti. "A Parallel-SQLIA Detector for Web Security." International Journal of Information Engineering and Electronic Business 8, no. 2 (March 8, 2016): 66–75. http://dx.doi.org/10.5815/ijieeb.2016.02.08.
Full textLibkin, Leonid. "SQL’s Three-Valued Logic and Certain Answers." ACM Transactions on Database Systems 41, no. 1 (April 7, 2016): 1–28. http://dx.doi.org/10.1145/2877206.
Full textXie, Cong, and Shao Jian Song. "Design of Door Monitoring Interface Based on Qt4 and SQLite." Applied Mechanics and Materials 556-562 (May 2014): 1592–96. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.1592.
Full textСуворов, Александр Павлович, and Сергей Петрович Зоткин. "Применение программы DB Browser for SQLite для создания баз данных." Естественные и Технические Науки, no. 09 (2020): 108–11. http://dx.doi.org/10.37882/2223-2966.2020.09.36.
Full textLokhande, Sharayu, and Vaishali Ganganwar. "Accessing and Modifying Sqlite Remotely for Catering Multi Client Access." International Journal of Science and Engineering Applications 4, no. 6 (November 19, 2015): 350–52. http://dx.doi.org/10.7753/ijsea0406.1003.
Full textYamamoto, Moriki, and Hisao Koizumi. "An Experimental Evaluation using SQLite for Real-Time Stream Processing." Journal of International Council on Electrical Engineering 3, no. 1 (January 2013): 68–72. http://dx.doi.org/10.5370/jicee.2013.3.1.068.
Full textRigin, A. M., and S. A. Shershakov. "SQLite RDBMS Extension for Data Indexing Using B-tree Modifications." Proceedings of the Institute for System Programming of the RAS 31, no. 3 (2019): 203–16. http://dx.doi.org/10.15514/ispras-2019-31(3)-16.
Full textKhwaldeh, Ali, Amani Tahat, Jordi Marti, and Mofleh Tahat. "Atomic Data Mining Numerical Methods, Source Code SQlite with Python." Procedia - Social and Behavioral Sciences 73 (February 2013): 232–39. http://dx.doi.org/10.1016/j.sbspro.2013.02.046.
Full textLiu, Chen Chen. "Research of Embedded Image Processing Based on ARM11 and SQLite." Applied Mechanics and Materials 373-375 (August 2013): 1603–6. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1603.
Full text