Results 211 to 220 of about 1,544,911 (270)
Advanced deep learning framework for detecting SQL injection attacks based on GRU Model
Oussama Senouci, Nadjib Benaouda
openalex +2 more sources
From Edge Transformer to IoT Decisions: Offloaded Embeddings for Lightweight Intrusion Detection. [PDF]
Adjewa F +2 more
europepmc +1 more source
Modelling of hybrid deep learning framework with recursive feature elimination for distributed denial of service attack detection systems. [PDF]
Alkhliwi S.
europepmc +1 more source
SQLiDetect: a web based intrusion detection system for SQL injections
Priyanka J. Hatwalne
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Advances in Engineering Innovation, 2023
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire +1 more source
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire +1 more source
Research on SQL Injection Detection Technology Based on Content Matching and Deep Learning
Computers, Materials & Continua: Structured Query Language (SQL) injection attacks have become the most common means of attacking Web applications due to their simple implementation and high degree of harm.
Yuqi Chen, Guangjun Liang, Qun Wang
semanticscholar +1 more source
Deep Neural Network-Based SQL Injection Detection Method
Security and Communication Networks, 2022Among the network security problems, SQL injection is a common and challenging network attack means, which can cause inestimable loop-breaking and loss to the database, and how to detect SQL injection statements is one of the current research hotspots ...
Wei Zhang +6 more
semanticscholar +1 more source
SQL Injection Countermeasures Methods
2020 International Conference on Computing and Information Technology (ICCIT-1441), 2020Many data created very quickly every day and eventually this data is stored on databases. All processes and processors use the database management system because of the privacy of the stored data and the data must be secured in this system and do not fail in front of the potential database attacks, so it is necessary to use security models, although ...
Hanan Alsobhi, Reem Alshareef
openaire +1 more source

