Results 61 to 70 of about 12,963 (201)
Статический анализ кода мобильных приложений как средство выявления его уязвимостей [PDF]
В статье рассмотрен статический анализ исходного кода программ для мобильных платформ как одно из средств обеспечения безопасности мобильных систем. Проанализированы различные сценарии практического применения такого рода анализатора в качестве средства ...
Цыганенко, Никита Павлович
core
Developer-Proof Prevention of SQL Injections [PDF]
SQL queries, when written by unskilled or hurried developers for web applications, are prone to SQL injections. We propose an alternative approach for querying SQL databases that does not suffer from this flaw. Our approach is based on abstract syntax trees, lets developers build dynamic queries easily, and is easier to set up than an ORM tool.
openaire +2 more sources
Self‐Driving Development of Perfusion Processes for Monoclonal Antibody Production
ABSTRACT The development of autonomous agents in bioprocess development is crucial for advancing biopharma innovation. Time and resources required to develop and transfer a process for clinical material generation can be significantly decreased. While robotics and machine learning have greatly accelerated drug discovery and initial screening, the later
Chethana Janardhana Gadiyar +10 more
wiley +1 more source
Intrusion Detection Framework for SQL Injection
7 pages, 5 Figures,ASIAN JOURNAL OF ENGINEERING, SCIENCES & TECHNOLOGY,VOL.6, ISSUE ...
Israr Ali +2 more
openaire +2 more sources
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner +5 more
wiley +1 more source
Using Nlp Techniques To Detect Sql Injection Attack
Most of the applications used on the internet are Web-Based Applications, that accept critical information from users and store this information in databases.
زاهر الشامي +1 more
doaj
SQL Injection in Oracle: An Exploration of Vulnerabilities [PDF]
Structured Query Language (SQL) injection is one of the most devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL Injection can compromise usernames, passwords,
Ansari, Sid, Sykes, Edward R.
core
This paper proposes SQLi‐ScanEval Framework, a standardized SQLi detection system that integrates vulnerability and penetration testing scanners into a standardized framework. It tested seven prominent SQLi vulnerability scanners including OWASP ZAP, Wapiti, Vega, Acunetix, Invicti, Burp Suite, and Arachni on two prominent vulnerable testing ...
Hajira Bashir +6 more
wiley +1 more source
SQLMVED: SQL injection runtime prevention system based on multi-variant execution
The effectiveness of combining SQL statement parsing with randomization to defend against SQL injection attack (SQLIA) was based on the fact that attackers did not know about the current method of randomization adopted by system.Therefore, once attackers
Bolin MA +3 more
doaj +2 more sources
IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks
The Internet of Things (IoT) technology is everywhere; they are making things more intelligent and connected, from smart cities to transport systems to homes, especially in the healthcare industry. This paper focuses on IoT in the healthcare domain.
Mohammed Mohammed Raoof +2 more
doaj +1 more source

