Results 121 to 130 of about 2,009 (161)
From Edge Transformer to IoT Decisions: Offloaded Embeddings for Lightweight Intrusion Detection. [PDF]
Adjewa F +2 more
europepmc +1 more source
SQL Injection Vulnerability Scanner(Secure Scan)
Aditi Biju +4 more
openaire +1 more source
The MongoDB injection dataset: A comprehensive collection of MongoDB - NoSQL injection attempts and vulnerabilities. [PDF]
D L R, H V A, Honnavalli PB, S N.
europepmc +1 more source
Mitigating distributed denial of service attacks using attribute subset selection with temporal convolutional networks. [PDF]
Alamro H +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Advances in Engineering Innovation, 2023
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire +1 more source
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire +1 more source
SQL Injection Countermeasures Methods
2020 International Conference on Computing and Information Technology (ICCIT-1441), 2020Many data created very quickly every day and eventually this data is stored on databases. All processes and processors use the database management system because of the privacy of the stored data and the data must be secured in this system and do not fail in front of the potential database attacks, so it is necessary to use security models, although ...
Hanan Alsobhi, Reem Alshareef
openaire +1 more source
2010
We began Part 2 with a discussion in Chapter 2 of keeping your PHP scripts secure by careful validation of user input. We continue that discussion here, focusing on user input that participates in your scripts’ interaction with your databases. Your data is, after all, probably your most treasured resource. Your primary goal in writing scripts to access
Chris Snyder +2 more
openaire +1 more source
We began Part 2 with a discussion in Chapter 2 of keeping your PHP scripts secure by careful validation of user input. We continue that discussion here, focusing on user input that participates in your scripts’ interaction with your databases. Your data is, after all, probably your most treasured resource. Your primary goal in writing scripts to access
Chris Snyder +2 more
openaire +1 more source
Review on SQL injection and prevention methods (SQL Injection Attacks)
SSRN Electronic Journal, 2008Today, the spread of the use of the Internet has led to the growth of explosive web design. Millions of users worldwide perform many of their important and vital activities through these websites and in the world of the Internet. This has turned the world of the Internet into a vast repository of information, information that is often important and ...
openaire +2 more sources
SQL injection prevention system
2016 International Conference Radio Electronics & Info Communications (UkrMiCo), 2016Existing vulnerabilities of Web system threaten the regular work of information systems. The most common Web system vulnerability is SQL injection. There is known approaches to protect Web applications against SQL injection attacks in the article. To improve the Web software security it is developed defense mechanism that protects Web resources from ...
O. P. Voitovych +2 more
openaire +1 more source
SQL Injection Attacks Countermeasures
2012Due to the huge growth in the need for using Web applications worldwide, there have been huge efforts from programmers to develop and implement new Web applications to be used by companies. Since a number of these applications lack proper security considerations, malicious users will be able to gain unauthorized access to confidential information of ...
Kasra Amirtahmasebi +1 more
openaire +1 more source

