Results 41 to 50 of about 12,963 (201)
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source
SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity
SQL (Structured Query Language) injection is one of the most prevalent and dangerous forms of cyber-attacks, posing significant threats to database management systems and the overall security of web applications.
Debendra Muduli +6 more
doaj +1 more source
ABSTRACT Aims To evaluate the real‐world associations between semaglutide 2.4 mg and cardiometabolic comorbidities, biomarkers and cardiovascular risk among adults with overweight or obesity. Methods This retrospective cohort study used US claims data and laboratory measurements from the Komodo Research Database (2016–2024). Adults with obesity or with
Aleksandrina Ruseva +11 more
wiley +1 more source
Tool for SQL Injection Vulnerability Detection [PDF]
Bakalářská práce je zaměřena na problematiku bezpečnostní chyby SQL injection. V práci jsou popsány běžně používané postupy při útocích na informační systémy a jsou také probrány možnosti obrany včetně uvedení způsobů správné validace vstupů aplikace ...
Kutypa, Matouš
core
Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García +4 more
wiley +1 more source
A Survey on SQL Injection Attacks Types & their Prevention Techniques
In the world of connectedness even more than ever before we are using digital technologies in daily life from bank transactions to social networking.
Jibran Rasheed Khan +2 more
doaj +1 more source
Safer in the Clouds (Extended Abstract) [PDF]
We outline the design of a framework for modelling cloud computing systems.The approach is based on a declarative programming model which takes the form of a lambda-calculus enriched with suitable mechanisms to express and enforce application-level ...
A. Banerjee +19 more
core +2 more sources
Large Language Models for Explainable Medical Text Summarization: A Systematic Literature Review
The graphical abstract highlights the three key aspects addressed in this review: the technical background of medical text summarization methods relevant to clinical decision support; the LLM background in providing context for its diagnosis and clinical significance; and clinical decision support with summarization and explainability in patient care ...
Aleka Melese Ayalew +3 more
wiley +1 more source
SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN
An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security Project (OWASP).
Xin Xie +4 more
doaj +1 more source
SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL ...
Yuting Guan +4 more
doaj +1 more source

