Results 1 to 10 of about 23,094 (187)

DeepSQLi: Deep Semantic Learning for Testing SQL Injection [PDF]

open access: green, 2020
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi   +15 more
core   +2 more sources

Review of SQL injection : problems and prevention [PDF]

open access: yesJOIV: International Journal on Informatics Visualization, 2018
SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks.
ABDUL-LATIFF, MUHAMMAD ABU BAKAR   +6 more
core   +5 more sources

DICED (Database of Identified Cleavage Sites Endemic to Diseases States): A Searchable Web Interface for Terminomics/Degradomics. [PDF]

open access: yesProteomics
ABSTRACT Proteolysis is an irreversible posttranslational modification with immense biological impact. Owing to its high disease significance, there is growing interest in investigating proteolysis on the proteome scale, termed degradomics. We developed ‘Database of Identified Cleavage sites Endemic to Disease states’ (DICED; https://diced.lerner.ccf ...
Joshi J   +5 more
europepmc   +2 more sources

Analysis of SQL Injection Attacks on Website Service [PDF]

open access: yes, 2018
Among the various types of software vulnerabilities, command injection is the most common type of threat in web applications. In command injection, SQL injection type of attacks areextremely prevalent, and ranked as the second most common form of attack ...
Kusuma, G. H. (Gregorius)
core   +2 more sources

Escrow: A large-scale web vulnerability assessment tool [PDF]

open access: yes, 2014
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core   +2 more sources

PachyRand: SQL Randomization for the PostgreSQL JDBC Driver [PDF]

open access: yes, 2005
Many websites are driven by web applications that deliver dynamic content stored in SQL databases. Such systems take input directly from the client via HTML forms.
Keromytis, Angelos D.   +1 more
core   +2 more sources

SQL Injection attack roadmap and fusion [PDF]

open access: yes, 2016
With SQL Injection, an attacker can change the intended effect of dynamically generated query in a web Application. This can lead to unauthorized access to the database underlying web application, and harmful transactions on the potentially sensitive ...
Abdullah @ Selimun, Mohd Taufik   +4 more
core   +1 more source

Basic database performance tuning - developer's perspective [PDF]

open access: yes, 2008
This lecture discusses selected database performance issues from the developer's point of view: connection overhead, bind variables and SQL injection, making most of the optimizer with up-to-date statistics, reading execution plans.
Kwiatek, Michal
core   +1 more source

Generation of amplitude-squeezed light from a room-temperature Fabry-Perot semiconductor laser [PDF]

open access: yes, 1995
Amplitude-squeezed light with intensity fluctuations 29% below the standard quantum limit (SQL) is produced from a pump-suppressed room-temperature semiconductor laser, corresponding to 41% below the SQL after correction for detection efficiency. Excess
Kitching, J., Provenzano, D., Yariv, A.
core   +1 more source

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy