[1]. By 2021, 75 percent of public blockchains will suffer privacy poisoning – inserted personal data that renders the blockchain noncompliant with privacy laws. https://www.dig-in.com/list/gartners-top-10-te ch-predictions-for-2019-and-beyond.
[2]. Truong Thu Huong , Ta Phuong Bac, Quoc Thong Nguyen, Huu Du Nguyen, Kim Phuc Tran, A data-driven approach for Network Intrusion Detection and Monitoring based on Kernel Null Space, EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 06 2019 - 08 2019 | Volume 6 | Issue 20| e1
[3]. AAP Alleges Mass Deletion Of Votes, EVM Tampering At All-Party Meet, 2018. https://www.ndt v.com/delhi-news/aap-alleges-mass-deletion-of -votesevm-tampering-at-all-party-meet-1960579.
[4]. Bigchaindb 2.0: The blockchain database. white paper, 2018. https://www.bigchaindb.com/whitepaper/bigch aindb-whitepaper.pdf.
[5]. Chaindb: A peer-to-peer database system, 2018. https ://bitpay.com/chaindb.pdf.
[6]. Congress demands JPC probe over alleged irregularities in Telangana polls, 2018. https://www.in diatoday.in/elections/story/congress-demands-jpc-pro be-over-alleged-irregularities-in-telangana-polls-14099 98-2018-12-15.
[7]. 2017 Insider Threat Study, 2017. https://haystax.com /blog/whitepapers/insider-attacks-industry-survey/.
[8]. Former University of Iowa student nabbed in high-tech cheating scheme, 2017. http://www.nydaily news.com/news/national/student-arrested-stealing-te sts-changing-grades-article-1.3595691.
[9]. Probe finds late grade changes for 5,500 in Prince Georges, 2017. https://www.washingtonpost.com/loca l/education/probe-finds-late-grade-changes-for-5500-i n-prince-georges/2017/11/03/5e54e10c-be62-11e7-959 c-fe2b598d8c00 story.html.
[10]. S. Achleitner, T. La Porta, P. McDaniel, S. Sugrim, S. V. Krishnamurthy, and R. Chadha. Cyber deception: Virtual networks to defend insider reconnaissance. In Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST ’16, pages 57–68, New York, NY, USA, 2016. ACM.
[11]. A. Vance, P. B. Lowry, and D. Eggett. Increasing accountability through user-interface design artifacts: A new approach to addressing the problem of access-policy violations. MIS Q., 39(2):345–366, June 2015.
[12]. Wang, C., Cai, W., Ye, Z., Yan, L., Wu, P., & Wang, Y., “Network Intrusion Detection Based on Lighting Search Algorithm Optimized Extreme Learning Machine”, 2018 13th International Conference on Computer Science & Education (ICCSE), 2018.
[13]. L. Fan, P. Cao, J. Almeida, and A. Z. Broder. “Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol”, IEEE Transactions on Networking, 2000, PP 281-293.
[14]. Qbea'h M, Alshraideh M & Sabri KE, “Detecting and preventing SQL injection attacks: a formal approach”, Cybersecurity and Cyberforensics Conference (CCC), pp.123-129,(2016).
[15]. Voitovych OP, Yuvkovetskyi OS & Kupershtein LM, “SQL Injection prevention system”, International Conference Radio Electronics & Info Communications (UkrMiCo),pp.1-4,(2016).
[16]. Brynielsson J & Sharma R, “Detectability of low-rate HTTP server DoS attacks using spectral analysis”, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp.954-961,(2015).
[17]. Qian L, Zhu Z, Hu J & Liu S, “Research of SQL injection attack and prevention technology”, International Conference on Estimation, Detection and Information Fusion (ICEDIF), pp.303-306,(2015).
[18]. Diksha G. Kumar, MadhumitaChatterjee “Detection Block Model for SQL Injection Attacks” I.J. computer Network and Information Security, 2014
[19]. BojkenShehu, AleksanderXhuvani “A literature Review and comparaative analysis on SQL injection: Vulnerabiities, attacks and their detection and prevention Techniques” International Journal of Computer Science Issues, Vol 11,Issue 4, no1 2014
[20]. GeogianaBuja, Dr. Kamarularifin Bin AbdJalil, Dr. Fakariah Bt. HjMohd Ali, The Faradilla Abdul “Detection model for SQL Injection Attack: An approach for preventing a web application from the SQL injection Attack”IEEE Symposium on Computer Applications and Industrial Electronics, April 2014
[21]. NunoSeixas, Marco Vieira, Jose Fonseca, Henrique Madeira “Analysis of field data on web security vulnerabilities ”IEEE Transactions on Dependable and secure computing Vol. 11 No.2 March/Aril 2014
[22]. HossaianShahriar, Mohammad Zulkernine, “Information Theoretic Detection of SQL Injection Attacks” International Symposium on highAssurance systems Engineering, IEEE 2014
[23]. Hussein AlNabulsi, IzzatAlsmadi,, Mohammad AlJarrah “Textual Manipulation for SQL Injection attack” I.J. computer Network and Information Security, 2014
[24]. Monali R. Boradel, Neeta A. Despande “Extensive Review of SQLIA’s Detection and Prevention Techniques” International Journal of Emerging Technology and Advanced Engineering ISSN 2250- 2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 10, October 2013
[25]. Shelly Rohilla, Pradeep Kumar Mittal “Database Security by Preventing SQL Injection Attacks in Stored Procedure” Journal of Advanced Research in Computer Science and software Engineering Volume 3, Issue 11 November 2013.
[26]. JaskanwalMinhas Raman Kumar “Blocking of SQL Injection attack by Comparing Static and Dynamic queries” International Journal of computer network and Information Security 2013
[27]. Mihir Gandhi, JwalantBaria “SQL INJECTION Attacks in Web application”International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-6, January 2013