Downloads provided by UsageCounts
Threre are various attacks in internet. The attacker gain s the unauthorized acess to the web based applications and performs data theft and modification to the database. SQL injection attacks are mostly found on web based applications. The unauthorized user gain acess to the system by creating sql queries that are totally different what the application needs. The social web sites like facebook, orkut, twitter involves sql injection attacks where hacker gets the access of user accounts and involves changing the profile information passing vulgar messages to the friends. The online banking transaction involves sql injection attacks where transaction by where unauthorized user is done. The The username password and confidential information is leaked. The plug-in tool is open source tool for detecting the sql injection and cross side scripting. It supports all kind of database and operating system.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 11 | |
| downloads | 11 |

Views provided by UsageCounts
Downloads provided by UsageCounts