-
1
Performance analysis of selected database management systems
Published 2024-09-01Subjects: “…MySQL…”
Get full text
Article -
2
Performance Evaluation of NewSQL Databases in a Distributed Architecture
Published 2025-01-01Subjects: Get full text
Article -
3
Improving The Performance of Big Data Databases
Published 2019-12-01Subjects: “…Keywords: Big data, Real-time and SQL, NoSQL…”
Get full text
Article -
4
Research on the SQL injection filtering based on SQL syntax tree
Published 2016-11-01Subjects: “…SQL injection attack…”
Get full text
Article -
5
An associated perception import method for big data
Published 2016-03-01Subjects: Get full text
Article -
6
Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications
Published 2024-11-01Subjects: Get full text
Article -
7
SOLUTIONS FOR AUTO-TESTING AND AUTO-WARNING WEBSITE ERRORS BASED ON THE RESULTS OF THE WEBSITE ERROR SCANNING TOOLS
Published 2016-06-01Subjects: Get full text
Article -
8
-
9
FI-NL2PY2SQL: Financial Industry NL2SQL Innovation Model Based on Python and Large Language Model
Published 2025-01-01Subjects: Get full text
Article -
10
CHOOSING THE APPROPRIATE DATABASE TYPE: A COMPARISON OF SQL, NOSQL, AND NEWSQL
Published 2024-12-01Subjects: Get full text
Article -
11
ReMetCa: A Proposal for Integrating RDBMS and TEI-Verse
Published 2015-09-01Subjects: Get full text
Article -
12
Approach to detecting SQL injection behaviors in network environment
Published 2016-02-01Subjects: Get full text
Article -
13
-
14
WEB VULNERABILITIES DETECTION USING A HYBRID MODEL OF CNN, GRU AND ATTENTION MECHANISM
Published 2025-01-01Subjects: Get full text
Article -
15
SQLMVED: SQL injection runtime prevention system based on multi-variant execution
Published 2021-04-01Subjects: “…SQL injection attack…”
Get full text
Article -
16
LotusSQL: SQL Engine for High-Performance Big Data Systems
Published 2021-12-01Subjects: “…structured query language (sql)…”
Get full text
Article -
17
Scheme and practice of IPTV user viewing behavior analysis based on MapR
Published 2017-02-01Subjects: Get full text
Article -
18
Discovery and research of network security vulnerabilities based on Web application
Published 2016-06-01Subjects: Get full text
Article -
19
-
20
Penetration test method using blind SQL injection based on second-order fragment and reassembly
Published 2017-10-01Subjects: “…SQL injection…”
Get full text
Article