Results 121 to 130 of about 2,009 (161)

SQL Injection Vulnerability Scanner(Secure Scan)

open access: yesSSRN Electronic Journal
Aditi Biju   +4 more
openaire   +1 more source

Mitigating distributed denial of service attacks using attribute subset selection with temporal convolutional networks. [PDF]

open access: yesSci Rep
Alamro H   +7 more
europepmc   +1 more source

SQL injection attacks

Advances in Engineering Innovation, 2023
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire   +1 more source

SQL Injection Countermeasures Methods

2020 International Conference on Computing and Information Technology (ICCIT-1441), 2020
Many data created very quickly every day and eventually this data is stored on databases. All processes and processors use the database management system because of the privacy of the stored data and the data must be secured in this system and do not fail in front of the potential database attacks, so it is necessary to use security models, although ...
Hanan Alsobhi, Reem Alshareef
openaire   +1 more source

Preventing SQL Injection

2010
We began Part 2 with a discussion in Chapter 2 of keeping your PHP scripts secure by careful validation of user input. We continue that discussion here, focusing on user input that participates in your scripts’ interaction with your databases. Your data is, after all, probably your most treasured resource. Your primary goal in writing scripts to access
Chris Snyder   +2 more
openaire   +1 more source

Review on SQL injection and prevention methods (SQL Injection Attacks)

SSRN Electronic Journal, 2008
Today, the spread of the use of the Internet has led to the growth of explosive web design. Millions of users worldwide perform many of their important and vital activities through these websites and in the world of the Internet. This has turned the world of the Internet into a vast repository of information, information that is often important and ...
openaire   +2 more sources

SQL injection prevention system

2016 International Conference Radio Electronics & Info Communications (UkrMiCo), 2016
Existing vulnerabilities of Web system threaten the regular work of information systems. The most common Web system vulnerability is SQL injection. There is known approaches to protect Web applications against SQL injection attacks in the article. To improve the Web software security it is developed defense mechanism that protects Web resources from ...
O. P. Voitovych   +2 more
openaire   +1 more source

SQL Injection Attacks Countermeasures

2012
Due to the huge growth in the need for using Web applications worldwide, there have been huge efforts from programmers to develop and implement new Web applications to be used by companies. Since a number of these applications lack proper security considerations, malicious users will be able to gain unauthorized access to confidential information of ...
Kasra Amirtahmasebi   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy