Results 51 to 60 of about 2,009 (161)

Effective SQL Injection Detection: A Fusion of Binary Olympiad Optimizer and Classification Algorithm

open access: yesMathematics
Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified.
Bahman Arasteh   +3 more
doaj   +1 more source

Developing an Accounting Virtual Assistant Through Supervised Fine‐Tuning (SFT) of a Small Language Model (SLM)

open access: yesIntelligent Systems in Accounting, Finance and Management, Volume 32, Issue 3, September 2025.
ABSTRACT The development of an in‐house accounting bot—an artificial intelligence (AI) assistant capable of generating internally structured bookkeeping double‐entry posting schemes—is explored in this paper. The processes of curating a suitable dataset, selecting, and fine‐tuning a seven‐billion‐parameter language model, categorized as a small ...
Mario Zupan
wiley   +1 more source

HYBRID INTRUSION DETECTION SYSTEM USING FUZZY LOGIC INFERENCE ENGINE FOR SQL INJECTION ATTACK

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2018
SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (
Rajif Agung Yunmar
doaj   +1 more source

Room for Improvement: A Blended Learning Concept With Teachers as Tutors and a Digital Exercise Type for Mechanical Equations

open access: yesPAMM, Volume 25, Issue 3, September 2025.
ABSTRACT Room for Improvement is a teaching concept that combines a digital learning platform with in‐person, tutor‐supported learning. Students work individually and actively on the platform while being physically present in a shared room with other students. Students ask questions. Tutors answer them.
Moritz Sattler, Daniel Rixen
wiley   +1 more source

CODDLE: Code-Injection Detection With Deep Learning

open access: yesIEEE Access, 2019
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj   +1 more source

Hydrothermally Induced Refractory DOC Sinks in the Deep Pacific Ocean

open access: yesGlobal Biogeochemical Cycles, Volume 39, Issue 9, September 2025.
Abstract Dissolved organic carbon (DOC) constitutes the largest pool of reduced carbon in the global ocean, with important contributions from both recently formed and aged, biologically refractory DOC (RDOC). The mechanisms regulating RDOC transformation and removal remain uncertain though hydrothermal vents have been identified as sources and sinks ...
D. A. Hansell   +6 more
wiley   +1 more source

Preventing SQL Injection Attacks

open access: yesInternational Journal of Computer Applications, 2012
With the recent rapid increase in web based applications that employ back-end database services, results show that SQL Injection and Remote File Inclusion are the two frequently used exploits rather than using other complicated techniques. With the rise in use of web applications, SQL injection based attacks are gradually increasing and is now one of ...
Vaidhyanathan.G Vaidhyanathan.G   +2 more
openaire   +1 more source

Tempus: An Evolutionary Mutation Testing System on Event‐Based Systems With Profile‐Based Individual Generation

open access: yesSoftware Testing, Verification and Reliability, Volume 35, Issue 5, August 2025.
Tempus is a testing system that enhances Evolutionary Mutation Testing (EMT) by using ProfileBased individual generation (PBig). PBig generates new individuals based on previous knowledge from other programs about which operators are more likely to produce strong mutants.
Lorena Gutiérrez‐Madroñal   +2 more
wiley   +1 more source

Application of Artificial Intelligence in Detecting SQL Injection Attacks

open access: yesJOIV: International Journal on Informatics Visualization
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped.
Nwabudike Augustine   +3 more
doaj   +1 more source

Models and scenarios of implementation of threats for internet resources

open access: yesРоссийский технологический журнал, 2020
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj   +1 more source

Home - About - Disclaimer - Privacy