Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard [PDF]
Sarah Elder+5 more
openalex +1 more source
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
In the past decade, cybersecurity has become increasingly significant, driven largely by the increase in cybersecurity threats. Among these threats, SQL injection attacks stand out as a particularly common method of cyber attack. Traditional methods for detecting these attacks mainly rely on manually defined features, making these detection outcomes ...
Yixian Liu, Yupeng Dai, Taimur Bakhshi
wiley +1 more source
Cyber security and protection of computer systems [PDF]
The work presents the methods for raising awareness regarding the safety of the Internet, i.e. the safety related to the production and maintenance of the web applications in order to preserve the reputation and to prevent loss of money as well as a ...
Emilija SPASOVA KAMCEVA, Nikolco SPASOV
doaj +1 more source
Securing Microservices‐Based IoT Networks: Real‐Time Anomaly Detection Using Machine Learning
Increased attention is being given to Internet of things (IoT) network security due to attempts to exploit vulnerabilities. Security techniques protecting availability, confidentiality, and information integrity have intensified as IoT devices are viewed as gateways to larger networks by malicious actors.
Maria Katherine Plazas Olaya+3 more
wiley +1 more source
So ein Saftladen: IT-Sicherheit in handlungsorientierten Fallbeispielen
IT-Sicherheit ist ein Thema, das immer dann in den öffentlichen Diskurs kommt, wenn Systeme gehackt oder anderweitig gestört werden. Auch in den schulischen Lehrplänen gewinnt es zunehmend an Bedeutung.
Reinhild Kokula+6 more
doaj +1 more source
Investigating the tension between cloud-related actors and individual privacy rights [PDF]
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob+2 more
core
An Efficient Framework for Security of Internet‐of‐Things Devices against Malicious Software Updates
The advent of smart cities has revolutionized urban living by providing innovative solutions, such as smart homes, smart hospitals, and smart parking. These smart applications have made life easier for people by improving infrastructure and accessibility. However, the development of smart cities also poses significant challenges for cybersecurity.
Anam Qureshi+3 more
wiley +1 more source
SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN
An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security Project (OWASP).
Xin Xie+4 more
doaj +1 more source
E-commerce that is growing so rapidly can provide space for unauthorized parties in carrying out cybercrime, security anticipation is needed so that e-commerce applications can be protected from harassment or hacking attacks such as cross-site scripting (
Imam Riadi, Rusydi Umar, Tri Lestari
doaj +1 more source
Preventing SQL Injection through Automatic Query Sanitization with ASSIST
Web applications are becoming an essential part of our everyday lives. Many of our activities are dependent on the functionality and security of these applications. As the scale of these applications grows, injection vulnerabilities such as SQL injection
Gwen Salaün+4 more
core +2 more sources