Method and Algorithm for Determining Weaknesses in a Distributed Database
| dc.contributor.author | Sadikov Sh.M. | |
| dc.date.accessioned | 2025-12-28T14:04:41Z | |
| dc.date.issued | 2023-08-20 | |
| dc.description.abstract | The article analyzes the SQL injection attack and its types in the distributed database, the vulnerability search algorithm, the vulnerability detection algorithm by query analysis in the MySQL (SQL) database, linear search algorithm, binary search algorithm, interpolation search algorithms have been developed | |
| dc.format | application/pdf | |
| dc.identifier.uri | https://scienticreview.com/index.php/gsr/article/view/262 | |
| dc.identifier.uri | https://asianeducationindex.com/handle/123456789/7493 | |
| dc.language.iso | eng | |
| dc.publisher | Global Scientific Publishing | |
| dc.relation | https://scienticreview.com/index.php/gsr/article/view/262/209 | |
| dc.rights | https://creativecommons.org/licenses/by-nc/4.0 | |
| dc.source | Global Scientific Review; Vol. 18 (2023): GSR; 22-29 | |
| dc.source | 2795-4951 | |
| dc.subject | SQL injection | |
| dc.subject | classic and blind SQL-injection | |
| dc.subject | offline injection | |
| dc.title | Method and Algorithm for Determining Weaknesses in a Distributed Database | |
| dc.type | info:eu-repo/semantics/article | |
| dc.type | info:eu-repo/semantics/publishedVersion | |
| dc.type | Peer-reviewed Article |
item.page.files
item.page.filesection.original.bundle
pagination.showing.detail
loading.default
- item.page.filesection.name
- shm_2023_method_and_algorithm_for_determining_wea.pdf
- item.page.filesection.size
- 344.3 KB
- item.page.filesection.format
- Adobe Portable Document Format