Method and Algorithm for Determining Weaknesses in a Distributed Database

dc.contributor.authorSadikov Sh.M.
dc.date.accessioned2025-12-28T14:04:41Z
dc.date.issued2023-08-20
dc.description.abstractThe article analyzes the SQL injection attack and its types in the distributed database, the vulnerability search algorithm, the vulnerability detection algorithm by query analysis in the MySQL (SQL) database, linear search algorithm, binary search algorithm, interpolation search algorithms have been developed
dc.formatapplication/pdf
dc.identifier.urihttps://scienticreview.com/index.php/gsr/article/view/262
dc.identifier.urihttps://asianeducationindex.com/handle/123456789/7493
dc.language.isoeng
dc.publisherGlobal Scientific Publishing
dc.relationhttps://scienticreview.com/index.php/gsr/article/view/262/209
dc.rightshttps://creativecommons.org/licenses/by-nc/4.0
dc.sourceGlobal Scientific Review; Vol. 18 (2023): GSR; 22-29
dc.source2795-4951
dc.subjectSQL injection
dc.subjectclassic and blind SQL-injection
dc.subjectoffline injection
dc.titleMethod and Algorithm for Determining Weaknesses in a Distributed Database
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Article

item.page.files

item.page.filesection.original.bundle

pagination.showing.labelpagination.showing.detail
loading.default
thumbnail.default.alt
item.page.filesection.name
shm_2023_method_and_algorithm_for_determining_wea.pdf
item.page.filesection.size
344.3 KB
item.page.filesection.format
Adobe Portable Document Format

item.page.collections