Results 91 to 100 of about 12,963 (201)

Pengembangan Keamanan Sistem Informasi Sst (Self Service Terminal) STMIK Pradnya Paramita Malang [PDF]

open access: yes, 2016
Information System Security is essential to ensure the proper functioning of the information system. Weak information system security may result that other people who do not have the right can be entered into the system information without passed the ...
Arifin, S. (Samsul)   +1 more
core  

SQL Injection Detection Based on Lightweight Multi-Head Self-Attention

open access: yesApplied Sciences
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo   +2 more
doaj   +1 more source

Approach to detecting SQL injection behaviors in network environment

open access: yesTongxin xuebao, 2016
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers.
Yu-fei ZHAO   +3 more
doaj   +2 more sources

A WEB-APPLICATION QUALITY ASSESSMENT MODEL BASED ON SQL-INJECTION VULNERABILITY DETECTION

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
A way of SQL-injection vulnerability detection based on static code analysis is discussed. A web-application internal quality model based on the results of automated detection of SQL-injection vulnerabilities is given.
D. E. Onoshko, V. V. Bakhtizin
doaj  

Penetration Testing pada Kerentanan Keamanan Sistem PELAKAT Menggunakan SQL Injection

open access: yesJurnal Teknologi dan Sistem Informasi
Penetration Testing bertujuan untuk mengidentifikasi kerentanan sistem dengan cara mensimulasikan serangan dengan teknik tertentu seperti SQL Injection.
Khairul, Asrul Abdullah, Sucipto Sucipto
doaj   +1 more source

Towards lightweight model using non-local-based graph convolution neural network for SQL injection detection

open access: yesEgyptian Informatics Journal
SQL injection poses serious threats to web applications and databases by enabling unauthorized access and data leakage. To address this issue, we propose a unique graph network, an innovative topology not explored previously for SQL injection detection ...
Duc-Chinh Nguyen   +3 more
doaj   +1 more source

SQL injection

open access: yes
În lucrarea dată este descris ce este SQL injection, care sunt cele mai des întâlnite metode de spargere a accounutilor folosite de hackers pentru a ataca contul utilizatorului. SQL injection este descries ca fiind o vulnerabilitate de securitate care apare atunci când un atacator reușește să manipuleze o interogare SQL într-un mod neintenționat de ...
Sîrbu, V., Saranciuc, D.I.
openaire   +1 more source

Detection of SQL Injection Attacks Based on Supervised Machine Learning Algorithms: A Review

open access: yesInternational Journal of Informatics, Information System and Computer Engineering
In the ever-changing world of cybersecurity, it is becoming more important to ensure integrity of web applications as well as securing sensitive data.
Hilmi Salih Abdullah   +1 more
doaj   +1 more source

INFO2009 - Team 'DROP TABLE groups; [PDF]

open access: yes
Edshare for INFO2009 coursework 2 - Team 'DROP TABLE ...
Bull, Samuel   +5 more
core  

Home - About - Disclaimer - Privacy