institution logo
If you're member of the institution,  you just have to login to download the file in restricted access. It is not necessary to request a print.

Request copy

Behind an Application Firewall, Are We Safe from SQL Injection Attacks?
Appelt, Dennis; Nguyen, Duy Cu; Briand, Lionel
2015In 2015 IEEE 8th International Conference on Software Testing, Verification, and Validation (ICST)

Document(s) requested
main.pdf

The desired document is not currently available on open access. Nevertheless you can request an offprint through the form below. If your request is accepted you will receive by e-mail a link allowing you access to the document for 5 days, 5 download attempts maximum.


Request form

Fields marked with ✱ are compulsory.

Back to the reference
Contact ORBilu