Results 221 to 230 of about 1,544,911 (270)
Some of the next articles are maybe not open access.

Enhancing Machine Learning Based SQL Injection Detection Using Contextualized Word Embedding

ACM Southeast Regional Conference
SQL injection (SQLi) attacks continue to severely threaten application security, allowing malicious actors to exploit web input and manipulate an application's database with malicious SQL code.
Janet Zulu   +3 more
semanticscholar   +1 more source

Semantic Query-Featured Ensemble Learning Model for SQL-Injection Attack Detection in IoT-Ecosystems

IEEE Transactions on Reliability, 2022
Structured query language (SQL) has emerged as one of the most used databases, serving an array of Internet-of-Things (IoTs)-enabled services including web-transactions, grid networks, industrial activity log and proactive decision systems, smart-home ...
Gowtham M, Pramod H B
semanticscholar   +1 more source

SQL Injection Attacks and Prevention

2023 6th International Conference on Information Systems and Computer Networks (ISCON), 2023
SQL Injection Attacks generally target the information stored in the database. Therefore, it becomes necessary for administrators to have mechanisms installed to detect and prevent them. Several mechanisms have been proposed for the same.
Kashish Gaur   +5 more
semanticscholar   +1 more source

Research on SQL Injection Attacks using Word Embedding Techniques and Machine Learning

Journal of Sensors, IoT & Health Sciences
Most of the damage done by web application attacks comes from SQL injection attacks, in which the attacker(s) can change, remove, and read data from the database servers.
S. Venkatramulu   +5 more
semanticscholar   +1 more source

Blockchain Cloud Computing: Comparative study on DDoS, MITM and SQL Injection Attack

2024 IEEE International Conference on Big Data & Machine Learning (ICBDML)
This research paper explores the potential of using blockchain technology in cloud computing security to mitigate DDoS, MITM, and SQL injection attacks.
Nagendra Singh   +5 more
semanticscholar   +1 more source

Preventing SQL Injection

2010
We began Part 2 with a discussion in Chapter 2 of keeping your PHP scripts secure by careful validation of user input. We continue that discussion here, focusing on user input that participates in your scripts’ interaction with your databases. Your data is, after all, probably your most treasured resource. Your primary goal in writing scripts to access
Chris Snyder   +2 more
openaire   +1 more source

Review on SQL injection and prevention methods (SQL Injection Attacks)

SSRN Electronic Journal, 2008
Today, the spread of the use of the Internet has led to the growth of explosive web design. Millions of users worldwide perform many of their important and vital activities through these websites and in the world of the Internet. This has turned the world of the Internet into a vast repository of information, information that is often important and ...
openaire   +2 more sources

SQL Injection Jailbreak: a structural disaster of large language models

Annual Meeting of the Association for Computational Linguistics
Large Language Models (LLMs) are susceptible to jailbreak attacks that can induce them to generate harmful content. Previous jailbreak methods primarily exploited the internal properties or capabilities of LLMs, such as optimization-based jailbreak ...
Jiawei Zhao   +3 more
semanticscholar   +1 more source

Enhancing SQL Injection Prevention: Advanced Machine Learning and LSTM-Based Techniques

International Journal on Computational Modelling Applications
A kind of cybercrime known as SQL injection lets attackers alter records by running bogus SQL queries into an input field. This could result from more serious security breaches, illegal access to sensitive data, and data corruption.
Ankita Ghosh   +2 more
semanticscholar   +1 more source

Defending the Digital World: A Comprehensive Guide Against SQL Injection Threats

International Conference Intelligent Data Communication Technologies and Internet Things
An SQL injection attack is one type of cyberattack targeting web application databases to gain data or modify the structure of data, such as insert, delete, or update.
Gaurav Kailash Borana   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy