Results 91 to 100 of about 23,541 (235)

The AEI 10 m prototype interferometer [PDF]

open access: yes, 2010
A 10 m prototype interferometer facility is currently being set up at the AEI in Hannover, Germany. The prototype interferometer will be housed inside a 100 m^3 ultra-high vacuum envelope. Seismically isolated optical tables inside the vacuum system will
Chen, Yanbei, Goßler, S., Somiya, K.
core  

Approach to detecting SQL injection behaviors in network environment

open access: yesTongxin xuebao, 2016
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers.
Yu-fei ZHAO   +3 more
doaj   +2 more sources

SQL Injection Detection Based on Lightweight Multi-Head Self-Attention

open access: yesApplied Sciences
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo   +2 more
doaj   +1 more source

Critical issue to consider while developing SQL injection prevention mechanism [PDF]

open access: yes, 2015
SQL injection vulnerability is the one of the most common web-based application vulnerabilities that can be exploited by SQL injection attack to gain access to restricted data, bypass authentication mechanism and execute unauthorized data manipulation ...
Aliero, Muhammad Saidu   +3 more
core  

SQL Injection Test (D3)

open access: green, 2021
Ignacio Crespo, Adrián Campazas
openalex   +2 more sources

APHRODITE: an Anomaly-based Architecture for False Positive Reduction [PDF]

open access: yes, 2006
We present APHRODITE, an architecture designed to reduce false positives in network intrusion detection systems. APHRODITE works by detecting anomalies in the output traffic, and by correlating them with the alerts raised by the NIDS working on the input
Bolzoni, Damiano, Etalle, Sandro
core   +4 more sources

Using Links to prototype a Database Wiki [PDF]

open access: yes, 2011
Both relational databases and wikis have strengths that make them attractive for use in collaborative applications. In the last decade, database-backed Web applications have been used extensively to develop valuable shared biological references called ...
Cheney, James   +2 more
core   +1 more source

Proceso de seguridad para evitar la infiltración de inyección SQL (SQL injection)

open access: diamond, 2022
Juan Manuel Bernal Ontiveros   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy