Results 81 to 90 of about 12,963 (201)

A Deep Learning Approach Using Optimized LSTM for Anomaly‐Based Network Intrusion Detection

open access: yesJournal of Engineering, Volume 2026, Issue 1, 2026.
With the exponential rise in cyber threats, anomaly‐based network intrusion detection systems (NIDSs) have become critical for maintaining robust cybersecurity. This article proposes an optimized long short‐term memory (LSTM) deep learning (DL) model specifically designed to detect anomalies in network traffic.
Samia Dardouri, Shikha Binwal
wiley   +1 more source

Reaction to New Security Threat Class [PDF]

open access: yes, 2014
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core  

Application of Artificial Intelligence in Detecting SQL Injection Attacks

open access: yesJOIV: International Journal on Informatics Visualization
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped.
Nwabudike Augustine   +3 more
doaj   +1 more source

Critical issue to consider while developing SQL injection prevention mechanism [PDF]

open access: yes, 2015
SQL injection vulnerability is the one of the most common web-based application vulnerabilities that can be exploited by SQL injection attack to gain access to restricted data, bypass authentication mechanism and execute unauthorized data manipulation ...
Aliero, Muhammad Saidu   +3 more
core  

A Framework for Evaluation of SQL Injection Detection and Prevention Tools

open access: yesInternational Journal of Information and Communication Technology Research, 2013
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj  

Algorithms and software solutions for SQL injection vulnerability testing in web applications

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, 2018
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk   +3 more
doaj   +1 more source

Static Analysis for Discovering Security Vulnerabilities in Web Applications on the Asp.Net Platform [PDF]

open access: yes, 2014
Tato bakalářská práce popisuje jak teoretické základy, tak způsob vytvoření statického analyzátoru založeném na platformě .NET Framework a službách poskytnutých prostřednictvím .NET Compiler Platform.
Říha, Jakub
core  

Pengujian Dan Analisa Keamanan Website Terhadap Serangan SQL Injection (Studi Kasus : Website UMK) [PDF]

open access: yes, 2014
Keamanan merupakan salah satu faktor penting yang harus diperhatikan dalam membangun sebuah website. Hal tersebut menjadi sebuah tantangan tersendiri bagi para pengembang website, karena tidak ada jaminan yang pasti akan defenisi aman? itu sendiri. Tidak
Anggraini, L. H. (Laelly)   +3 more
core  

Web Security Detection Tool [PDF]

open access: yes, 2008
According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]
Agashe, Abhishek
core   +1 more source

Early Detection of SQL Injection Attacks

open access: yesInternational Journal of Network Security & Its Applications, 2013
SQL Injection (SQLI) is a common vulnerability found in web applications. The starting point of SQLI attack is the client-side (browser). If attack inputs can be detected early at the browse side, then it could be thwarted early by not forwarding the malicious inputs to the server-side for further processing.
Shahriar, Hossain   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy