Research Article

Research on SQL Injection Attack and Defense Technology of Power Dispatching Data Network: Based on Data Mining

Figure 2

Dataset distribution diagram of conventional words and sensitive characters.