Method and Algorithm for Determining Weaknesses in a Distributed Database

loading.default
thumbnail.default.alt

item.page.date

item.page.authors

item.page.journal-title

item.page.journal-issn

item.page.volume-title

item.page.publisher

Global Scientific Publishing

item.page.abstract

The article analyzes the SQL injection attack and its types in the distributed database, the vulnerability search algorithm, the vulnerability detection algorithm by query analysis in the MySQL (SQL) database, linear search algorithm, binary search algorithm, interpolation search algorithms have been developed

item.page.description

item.page.citation

item.page.collections

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced