[{"publication_identifier":{"isbn":["9780769531021"]},"publication_status":"published","page":"771-778","citation":{"short":"S. Böttcher, R. Hartel, M. Kirschner, in: Third International Conference on Availability, Reliability and Security, IEEE, 2008, pp. 771–778.","mla":"Böttcher, Stefan, et al. “Detecting Suspicious Relational Database Queries.” <i>Third International Conference on Availability, Reliability and Security</i>, IEEE, 2008, pp. 771–78, doi:<a href=\"https://doi.org/10.1109/ares.2008.125\">10.1109/ares.2008.125</a>.","bibtex":"@inproceedings{Böttcher_Hartel_Kirschner_2008, title={Detecting Suspicious Relational Database Queries}, DOI={<a href=\"https://doi.org/10.1109/ares.2008.125\">10.1109/ares.2008.125</a>}, booktitle={Third International Conference on Availability, Reliability and Security}, publisher={IEEE}, author={Böttcher, Stefan and Hartel, Rita and Kirschner, Matthias}, year={2008}, pages={771–778} }","apa":"Böttcher, S., Hartel, R., &#38; Kirschner, M. (2008). Detecting Suspicious Relational Database Queries. In <i>Third International Conference on Availability, Reliability and Security</i> (pp. 771–778). IEEE. <a href=\"https://doi.org/10.1109/ares.2008.125\">https://doi.org/10.1109/ares.2008.125</a>","ama":"Böttcher S, Hartel R, Kirschner M. Detecting Suspicious Relational Database Queries. In: <i>Third International Conference on Availability, Reliability and Security</i>. IEEE; 2008:771-778. doi:<a href=\"https://doi.org/10.1109/ares.2008.125\">10.1109/ares.2008.125</a>","ieee":"S. Böttcher, R. Hartel, and M. Kirschner, “Detecting Suspicious Relational Database Queries,” in <i>Third International Conference on Availability, Reliability and Security</i>, 2008, pp. 771–778.","chicago":"Böttcher, Stefan, Rita Hartel, and Matthias Kirschner. “Detecting Suspicious Relational Database Queries.” In <i>Third International Conference on Availability, Reliability and Security</i>, 771–78. IEEE, 2008. <a href=\"https://doi.org/10.1109/ares.2008.125\">https://doi.org/10.1109/ares.2008.125</a>."},"year":"2008","author":[{"full_name":"Böttcher, Stefan","id":"624","last_name":"Böttcher","first_name":"Stefan"},{"first_name":"Rita","last_name":"Hartel","full_name":"Hartel, Rita","id":"14961"},{"full_name":"Kirschner, Matthias","last_name":"Kirschner","first_name":"Matthias"}],"date_created":"2019-11-22T08:53:19Z","publisher":"IEEE","date_updated":"2022-01-06T06:52:16Z","doi":"10.1109/ares.2008.125","title":"Detecting Suspicious Relational Database Queries","publication":"Third International Conference on Availability, Reliability and Security","type":"conference","status":"public","department":[{"_id":"69"}],"user_id":"14961","_id":"15141","language":[{"iso":"eng"}]}]
