Results 51 to 60 of about 2,009 (161)
Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified.
Bahman Arasteh +3 more
doaj +1 more source
ABSTRACT The development of an in‐house accounting bot—an artificial intelligence (AI) assistant capable of generating internally structured bookkeeping double‐entry posting schemes—is explored in this paper. The processes of curating a suitable dataset, selecting, and fine‐tuning a seven‐billion‐parameter language model, categorized as a small ...
Mario Zupan
wiley +1 more source
HYBRID INTRUSION DETECTION SYSTEM USING FUZZY LOGIC INFERENCE ENGINE FOR SQL INJECTION ATTACK
SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (
Rajif Agung Yunmar
doaj +1 more source
ABSTRACT Room for Improvement is a teaching concept that combines a digital learning platform with in‐person, tutor‐supported learning. Students work individually and actively on the platform while being physically present in a shared room with other students. Students ask questions. Tutors answer them.
Moritz Sattler, Daniel Rixen
wiley +1 more source
CODDLE: Code-Injection Detection With Deep Learning
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj +1 more source
Hydrothermally Induced Refractory DOC Sinks in the Deep Pacific Ocean
Abstract Dissolved organic carbon (DOC) constitutes the largest pool of reduced carbon in the global ocean, with important contributions from both recently formed and aged, biologically refractory DOC (RDOC). The mechanisms regulating RDOC transformation and removal remain uncertain though hydrothermal vents have been identified as sources and sinks ...
D. A. Hansell +6 more
wiley +1 more source
Preventing SQL Injection Attacks
With the recent rapid increase in web based applications that employ back-end database services, results show that SQL Injection and Remote File Inclusion are the two frequently used exploits rather than using other complicated techniques. With the rise in use of web applications, SQL injection based attacks are gradually increasing and is now one of ...
Vaidhyanathan.G Vaidhyanathan.G +2 more
openaire +1 more source
Tempus is a testing system that enhances Evolutionary Mutation Testing (EMT) by using ProfileBased individual generation (PBig). PBig generates new individuals based on previous knowledge from other programs about which operators are more likely to produce strong mutants.
Lorena Gutiérrez‐Madroñal +2 more
wiley +1 more source
Application of Artificial Intelligence in Detecting SQL Injection Attacks
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped.
Nwabudike Augustine +3 more
doaj +1 more source
Models and scenarios of implementation of threats for internet resources
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj +1 more source

