… 2. Propagation method: How the virus moves from one victim machine or file to another … One technique is to ensure that file size goes back to its original size, despite the … attackers target webforms with malformed SQL queries to be able to access system backend databases …
CITATION STYLE
Alsmadi, I. (2020). Information Systems Security Management. In The NICE Cyber Security Framework (pp. 31–53). Springer International Publishing. https://doi.org/10.1007/978-3-030-41987-5_2
Mendeley helps you to discover research relevant for your work.