{"id":"https://openalex.org/W2897003907","doi":"https://doi.org/10.1145/3207677.3277958","title":"SQL Injection Attack Principles and Preventive Techniques for PHP Site","display_name":"SQL Injection Attack Principles and Preventive Techniques for PHP Site","publication_year":2018,"publication_date":"2018-10-18","ids":{"openalex":"https://openalex.org/W2897003907","doi":"https://doi.org/10.1145/3207677.3277958","mag":"2897003907"},"language":"en","primary_location":{"id":"doi:10.1145/3207677.3277958","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3207677.3277958","pdf_url":null,"source":{"id":"https://openalex.org/S4306523741","display_name":"Proceedings of the 2nd International Conference on Computer Science and Application Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100325480","display_name":"Haiyan Zhang","orcid":"https://orcid.org/0000-0001-5201-5579"},"institutions":[{"id":"https://openalex.org/I169071405","display_name":"Hebei North University","ror":"https://ror.org/03hqwnx39","country_code":"CN","type":"education","lineage":["https://openalex.org/I169071405"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haiyan Zhang","raw_affiliation_strings":["Agricultural informatics, Hebei North University, Zhangjiakou, China"],"affiliations":[{"raw_affiliation_string":"Agricultural informatics, Hebei North University, Zhangjiakou, China","institution_ids":["https://openalex.org/I169071405"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100696227","display_name":"Xiao Zhang","orcid":"https://orcid.org/0000-0003-3669-4254"},"institutions":[{"id":"https://openalex.org/I169071405","display_name":"Hebei North University","ror":"https://ror.org/03hqwnx39","country_code":"CN","type":"education","lineage":["https://openalex.org/I169071405"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Zhang","raw_affiliation_strings":["Medical informatics, Hebei North University, Zhangjiakou, China"],"affiliations":[{"raw_affiliation_string":"Medical informatics, Hebei North University, Zhangjiakou, China","institution_ids":["https://openalex.org/I169071405"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100325480"],"corresponding_institution_ids":["https://openalex.org/I169071405"],"apc_list":null,"apc_paid":null,"fwci":1.2026,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.82745826,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9810000061988831,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.920799970626831,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9088000059127808,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.9523485898971558},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.817084789276123},{"id":"https://openalex.org/keywords/sql","display_name":"SQL","score":0.5506222248077393},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49317044019699097},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.469854474067688},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.45598936080932617},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.42185813188552856},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3956644833087921},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.34750229120254517},{"id":"https://openalex.org/keywords/query-by-example","display_name":"Query by Example","score":0.2752731442451477},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.21274766325950623}],"concepts":[{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.9523485898971558},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.817084789276123},{"id":"https://openalex.org/C510870499","wikidata":"https://www.wikidata.org/wiki/Q47607","display_name":"SQL","level":2,"score":0.5506222248077393},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49317044019699097},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.469854474067688},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.45598936080932617},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.42185813188552856},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3956644833087921},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.34750229120254517},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.2752731442451477},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.21274766325950623},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3207677.3277958","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3207677.3277958","pdf_url":null,"source":{"id":"https://openalex.org/S4306523741","display_name":"Proceedings of the 2nd International Conference on Computer Science and Application Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2nd International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7300000190734863,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W801408549","https://openalex.org/W2348542658","https://openalex.org/W2388450087"],"related_works":["https://openalex.org/W3107810407","https://openalex.org/W2571113418","https://openalex.org/W2359391484","https://openalex.org/W4206678297","https://openalex.org/W3196457791","https://openalex.org/W2133089983","https://openalex.org/W3202423697","https://openalex.org/W4385682279","https://openalex.org/W4372049114","https://openalex.org/W2915735776"],"abstract_inverted_index":{"With1":[0],"the":[1,19,37,47,56,63,66,75,83,90],"rapid":[2],"development":[3],"of":[4,40,49],"computer":[5],"network":[6,22],"technology,":[7],"people's":[8],"life":[9],"and":[10,15,95,117],"work":[11],"have":[12,25,35],"become":[13,36],"more":[14,16],"dependent":[17],"on":[18,74,82],"Internet.":[20],"Consequent":[21],"security":[23,48],"issues":[24],"also":[26],"received":[27],"much":[28],"attention.":[29],"At":[30],"present,":[31],"SQL":[32,42,67,77,91,99,115,127],"injection":[33,43,68,78,92,100,116,128],"attacks":[34],"main":[38],"method":[39],"hacking.":[41],"vulnerabilities":[44],"seriously":[45],"threaten":[46],"WEB":[50,104,123],"application":[51],"systems.":[52],"This":[53,107],"article":[54,108],"takes":[55],"PHP":[57],"language":[58],"as":[59],"an":[60],"example,":[61],"introduces":[62],"reasons":[64],"for":[65,113,122],"in":[69,126],"detail,":[70],"conducts":[71],"in-depth":[72],"research":[73],"common":[76],"attack":[79],"methods.":[80],"Based":[81],"practical":[84],"penetration":[85],"testing":[86,114],"practice,":[87],"puts":[88],"forward":[89],"detection":[93],"technology":[94],"how":[96],"to":[97],"avoid":[98],"vulnerability":[101],"when":[102],"writing":[103],"program":[105],"code.":[106],"provides":[109,118],"detailed":[110],"technical":[111],"support":[112],"a":[119],"powerful":[120],"guarantee":[121],"information":[124],"system":[125],"defense.":[129]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-22T08:09:32.410652","created_date":"2025-10-10T00:00:00"}
