Results 21 to 30 of about 2,009 (161)
Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security [PDF]
A pervasive security issue in web applications is database injection, enabling attackers to alter SQL queries in order to get unauthorized access to confidential information.
Lu Zhexi
doaj +1 more source
Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy ...
Oluwakemi Christiana Abikoye +4 more
doaj +1 more source
Website merupakan kumpulan halaman yang menampilkan informasi yang bersifat statis maupun dinamis. Seiring dengan perkembangan website, website tidak sekedar menjadi media informasi saja melainkan juga sebagai e-commerce, media sharing, platform e ...
Difa Maulana, Alif Subardono
doaj +1 more source
Provably throttling SQLI using an enciphering query and secure matching
Web applications, which dominate the internet, act as communication media between customers and service providers. Web applications are an internet innovation that provide customer services such as e-banking, e-commerce and e-booking.
Mohammed Abdulridha Hussain +7 more
doaj +1 more source
TopoMAS: Large Language Model Driven Topological Materials Multi‐Agent System
TopoMAS is an interactive multi‐agent framework that revolutionizes topological materials discovery through human–AI collaborative intelligence. The system integrates natural language processing, knowledge retrieval from literature and databases, crystal structure generation, and automated first‐principles calculations within a unified workflow.
Baohua Zhang +5 more
wiley +1 more source
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
Self‐Driving Development of Perfusion Processes for Monoclonal Antibody Production
ABSTRACT The development of autonomous agents in bioprocess development is crucial for advancing biopharma innovation. Time and resources required to develop and transfer a process for clinical material generation can be significantly decreased. While robotics and machine learning have greatly accelerated drug discovery and initial screening, the later
Chethana Janardhana Gadiyar +10 more
wiley +1 more source
SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity
SQL (Structured Query Language) injection is one of the most prevalent and dangerous forms of cyber-attacks, posing significant threats to database management systems and the overall security of web applications.
Debendra Muduli +6 more
doaj +1 more source
A SQL Injection Detection Method Based on Adaptive Deep Forest
Injection attack is the first of the top 10 security threats announced by the OWASP. Meanwhile, SQL injection is one of the most important types among the injection attacks.
Qi Li +3 more
doaj +1 more source
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner +5 more
wiley +1 more source

