Results 151 to 160 of about 12,963 (201)
Spatial pinning of globally inert pores in a superhydrophobic hydrogen-bonded organic framework for inverse ethane/ethylene separation. [PDF]
Cai Y +6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A Learning Platform for SQL Injection
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019We present a web application system where users can learn about and practice SQL injection attacks. Our system is designed for students in a university level database or computer security class, and is aimed towards students familiar with SQL but with little experience in web security.
Nada Basit +3 more
openaire +1 more source
Review on SQL injection and prevention methods (SQL Injection Attacks)
SSRN Electronic Journal, 2008Today, the spread of the use of the Internet has led to the growth of explosive web design. Millions of users worldwide perform many of their important and vital activities through these websites and in the world of the Internet. This has turned the world of the Internet into a vast repository of information, information that is often important and ...
openaire +2 more sources
Advances in Engineering Innovation, 2023
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire +1 more source
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire +1 more source
On Preventing SQL Injection Attacks
2015In this paper, we propose three new approaches to detect and prevent SQL Injection Attacks (SQLIA), as an alternative to the existing solutions namely: (i) Query Rewriting-based approach, (ii) Encoding-based approach, and (iii) Assertion-based approach. We discuss in detail the benefits and shortcomings of the proposals w.r.t. the literature.
Bharat Kumar Ahuja +3 more
openaire +1 more source
SQL injection attacks with the AMPA suite
International Journal of Electronic Security and Digital Forensics, 2013The suite of tools presented here was developed to exploit the lack of sanitisation found in user inputs that reached a target database and sometimes even the server. The focus for the design of the tools was a BLIND SQL injection, the verbosity of the attack and the possibility to inject a web shell which enabled Meterpreter to open a reverse ...
Simone Cecchini, Diane Gan
openaire +1 more source
Testing Snort with SQL Injection Attacks
Proceedings of the Ninth International C* Conference on Computer Science & Software Engineering - C3S2E '16, 2016Currently, information security is a significant challenge in the information era because businesses store critical information in databases. Therefore, databases need to be a secure component of an enterprise. Organizations use Intrusion Detection Systems (IDS) as a security infrastructure component, of which a popular implementation is Snort. In this
Rui Silva +2 more
openaire +1 more source
A survey of SQL injection defense mechanisms
2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009SQL Injection Attack (SQLIA) is a prevalent method which makes it possible for the attackers to gain direct access to the database and culminates in extracting sensitive information from the firm's database. In this survey, we have presented and analyzed six different SQL Injection prevention techniques which can be used for securing the data storage ...
Kasra Amirtahmasebi +2 more
openaire +1 more source
MAC based solution for SQL injection
Journal of Computer Virology and Hacking Techniques, 2014With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers’ lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats.
Diksha Gautam Kumar +1 more
openaire +1 more source
2010
We began Part 2 with a discussion in Chapter 2 of keeping your PHP scripts secure by careful validation of user input. We continue that discussion here, focusing on user input that participates in your scripts’ interaction with your databases. Your data is, after all, probably your most treasured resource. Your primary goal in writing scripts to access
Chris Snyder +2 more
openaire +1 more source
We began Part 2 with a discussion in Chapter 2 of keeping your PHP scripts secure by careful validation of user input. We continue that discussion here, focusing on user input that participates in your scripts’ interaction with your databases. Your data is, after all, probably your most treasured resource. Your primary goal in writing scripts to access
Chris Snyder +2 more
openaire +1 more source

