Results 71 to 80 of about 12,963 (201)
Abstract Submarine groundwater discharge (SGD) is a significant source of nutrients to continental shelf waters. Increasing evidence suggests that most of this flow is saline (∼seawater salinity) and occurs across broad continental shelves, making it challenging to observe.
Jacob Vincent +7 more
wiley +1 more source
Blocking SQL Injection in Database Stored Procedures [PDF]
This thesis contains a summary of all the work that has been done by us for the B-Tech project in the academic session of 2009-2010. The area chosen for the project was SQL Injection attacks and methods to prevent them, and this thesis goes on to ...
Panchamukhi, S, Sarangi, A
core
TrafficRobot: An AI Agent Framework for Urban Traffic Management
ABSTRACT As urbanisation accelerates, traditional Intelligent Transportation Systems (ITSs), reliant on manual monitoring and rule‐based logic, struggle to manage increasingly complex and dynamic traffic conditions. This study proposes TrafficRobot, a hierarchical AI agent framework that implements a closed‐loop control flow for urban traffic ...
Xiaohua Liu +3 more
wiley +1 more source
AI‐Powered Defense: Leveraging Deep Learning for Effective Malware Detection
Traditional malware detection techniques frequently fail to detect and stop malicious activity in an era where cyber threats are becoming more complex. Any software that enters a computer system without the administrator’s consent is considered malicious software.
Nancy Awadallah Awad +1 more
wiley +1 more source
HYBRID INTRUSION DETECTION SYSTEM USING FUZZY LOGIC INFERENCE ENGINE FOR SQL INJECTION ATTACK
SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (
Rajif Agung Yunmar
doaj +1 more source
SQL Injection - Database Attack Revolution and Prevention [PDF]
SQL injection came with a bang and caused revolution in database attacking. In recent years, with the explosion in web-based commerce and information systems, databases have been drawing ever closer to the network and it is critical part of network ...
Dorai, R. (Ramakanth) +1 more
core
Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa +5 more
wiley +1 more source
CODDLE: Code-Injection Detection With Deep Learning
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj +1 more source
A Knowledge Reuse–Based Approach for Rapid Design of an Active Phased Array Antenna
Active phased array antenna is a typical multidisciplinary, intensive knowledge‐based equipment, and the traditional “design–analysis–improvement–redesign” method has problems including low utilization of mature design resources and long design cycles, and it is difficult to meet the efficient design needs of antennas. Active phased array antenna has a
Yan Wang +10 more
wiley +1 more source
Analysis of SQL Injection Detection Techniques [PDF]
SQL Injection is one of the vulnerabilities in OWASPs Top Ten List for Web Based Application Exploitation.These types of attacks takes place on Dynamic Web applications as they interact with the databases for the various operations.Current Content Management System like Drupal, Joomla or Wordpress have all the information stored in their databases.
openaire +3 more sources

