Results 91 to 100 of about 12,963 (201)
Pengembangan Keamanan Sistem Informasi Sst (Self Service Terminal) STMIK Pradnya Paramita Malang [PDF]
Information System Security is essential to ensure the proper functioning of the information system. Weak information system security may result that other people who do not have the right can be entered into the system information without passed the ...
Arifin, S. (Samsul) +1 more
core
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo +2 more
doaj +1 more source
Approach to detecting SQL injection behaviors in network environment
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers.
Yu-fei ZHAO +3 more
doaj +2 more sources
A WEB-APPLICATION QUALITY ASSESSMENT MODEL BASED ON SQL-INJECTION VULNERABILITY DETECTION
A way of SQL-injection vulnerability detection based on static code analysis is discussed. A web-application internal quality model based on the results of automated detection of SQL-injection vulnerabilities is given.
D. E. Onoshko, V. V. Bakhtizin
doaj
Penetration Testing pada Kerentanan Keamanan Sistem PELAKAT Menggunakan SQL Injection
Penetration Testing bertujuan untuk mengidentifikasi kerentanan sistem dengan cara mensimulasikan serangan dengan teknik tertentu seperti SQL Injection.
Khairul, Asrul Abdullah, Sucipto Sucipto
doaj +1 more source
SQL injection poses serious threats to web applications and databases by enabling unauthorized access and data leakage. To address this issue, we propose a unique graph network, an innovative topology not explored previously for SQL injection detection ...
Duc-Chinh Nguyen +3 more
doaj +1 more source
În lucrarea dată este descris ce este SQL injection, care sunt cele mai des întâlnite metode de spargere a accounutilor folosite de hackers pentru a ataca contul utilizatorului. SQL injection este descries ca fiind o vulnerabilitate de securitate care apare atunci când un atacator reușește să manipuleze o interogare SQL într-un mod neintenționat de ...
Sîrbu, V., Saranciuc, D.I.
openaire +1 more source
Detection of SQL Injection Attacks Based on Supervised Machine Learning Algorithms: A Review
In the ever-changing world of cybersecurity, it is becoming more important to ensure integrity of web applications as well as securing sensitive data.
Hilmi Salih Abdullah +1 more
doaj +1 more source
Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks. [PDF]
Cho YC, Pan JY.
europepmc +1 more source
INFO2009 - Team 'DROP TABLE groups; [PDF]
Edshare for INFO2009 coursework 2 - Team 'DROP TABLE ...
Bull, Samuel +5 more
core

