Results 1 to 10 of about 23,094 (187)
DeepSQLi: Deep Semantic Learning for Testing SQL Injection [PDF]
Security is unarguably the most serious concern for Web applications, to which SQL injection (SQLi) attack is one of the most devastating attacks. Automatically testing SQLi vulnerabilities is of ultimate importance, yet is unfortunately far from trivial
Anna Huang Cheng-Zhi +15 more
core +2 more sources
Review of SQL injection : problems and prevention [PDF]
SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks.
ABDUL-LATIFF, MUHAMMAD ABU BAKAR +6 more
core +5 more sources
DICED (Database of Identified Cleavage Sites Endemic to Diseases States): A Searchable Web Interface for Terminomics/Degradomics. [PDF]
ABSTRACT Proteolysis is an irreversible posttranslational modification with immense biological impact. Owing to its high disease significance, there is growing interest in investigating proteolysis on the proteome scale, termed degradomics. We developed ‘Database of Identified Cleavage sites Endemic to Disease states’ (DICED; https://diced.lerner.ccf ...
Joshi J +5 more
europepmc +2 more sources
Analysis of SQL Injection Attacks on Website Service [PDF]
Among the various types of software vulnerabilities, command injection is the most common type of threat in web applications. In command injection, SQL injection type of attacks areextremely prevalent, and ranked as the second most common form of attack ...
Kusuma, G. H. (Gregorius)
core +2 more sources
Escrow: A large-scale web vulnerability assessment tool [PDF]
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core +2 more sources
PachyRand: SQL Randomization for the PostgreSQL JDBC Driver [PDF]
Many websites are driven by web applications that deliver dynamic content stored in SQL databases. Such systems take input directly from the client via HTML forms.
Keromytis, Angelos D. +1 more
core +2 more sources
SQL Injection attack roadmap and fusion [PDF]
With SQL Injection, an attacker can change the intended effect of dynamically generated query in a web Application. This can lead to unauthorized access to the database underlying web application, and harmful transactions on the potentially sensitive ...
Abdullah @ Selimun, Mohd Taufik +4 more
core +1 more source
Basic database performance tuning - developer's perspective [PDF]
This lecture discusses selected database performance issues from the developer's point of view: connection overhead, bind variables and SQL injection, making most of the optimizer with up-to-date statistics, reading execution plans.
Kwiatek, Michal
core +1 more source
Generation of amplitude-squeezed light from a room-temperature Fabry-Perot semiconductor laser [PDF]
Amplitude-squeezed light with intensity fluctuations 29% below the standard quantum limit (SQL) is produced from a pump-suppressed room-temperature semiconductor laser, corresponding to 41% below the SQL after correction for detection efficiency. Excess
Kitching, J., Provenzano, D., Yariv, A.
core +1 more source
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana +2 more
core +1 more source

