Results 91 to 100 of about 23,541 (235)
The AEI 10 m prototype interferometer [PDF]
A 10 m prototype interferometer facility is currently being set up at the AEI in Hannover, Germany. The prototype interferometer will be housed inside a 100 m^3 ultra-high vacuum envelope. Seismically isolated optical tables inside the vacuum system will
Chen, Yanbei, Goßler, S., Somiya, K.
core
ConsiDroid: A Concolic-based Tool for Detecting SQL Injection\n Vulnerability in Android Apps [PDF]
Ehsan Edalat +2 more
openalex +1 more source
Ensemble Machine Learning Approaches for Detection of SQL Injection Attack
Umar Farooq
openalex +2 more sources
Approach to detecting SQL injection behaviors in network environment
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers.
Yu-fei ZHAO +3 more
doaj +2 more sources
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo +2 more
doaj +1 more source
Critical issue to consider while developing SQL injection prevention mechanism [PDF]
SQL injection vulnerability is the one of the most common web-based application vulnerabilities that can be exploited by SQL injection attack to gain access to restricted data, bypass authentication mechanism and execute unauthorized data manipulation ...
Aliero, Muhammad Saidu +3 more
core
APHRODITE: an Anomaly-based Architecture for False Positive Reduction [PDF]
We present APHRODITE, an architecture designed to reduce false positives in network intrusion detection systems. APHRODITE works by detecting anomalies in the output traffic, and by correlating them with the alerts raised by the NIDS working on the input
Bolzoni, Damiano, Etalle, Sandro
core +4 more sources
Using Links to prototype a Database Wiki [PDF]
Both relational databases and wikis have strengths that make them attractive for use in collaborative applications. In the last decade, database-backed Web applications have been used extensively to develop valuable shared biological references called ...
Cheney, James +2 more
core +1 more source
Proceso de seguridad para evitar la infiltración de inyección SQL (SQL injection)
Juan Manuel Bernal Ontiveros +4 more
openalex +1 more source

