________ detection methods for SQL Injection attacks are based on verifying distinct patterns. This approach must be routinely updated and may be unsuccessful against self-modifying attacks.
a.Signature based
b.No Answer
c.None of the Above
d.All of the Above
e.Code Analysis
f.Anomaly based