Results 231 to 240 of about 1,544,911 (270)
Some of the next articles are maybe not open access.
2024 4th International Conference of Science and Information Technology in Smart Administration (ICSINTESA)
Analyzing logs can aid in debugging or optimizing system performance. A comprehension of system efficacy is frequently linked to an awareness of the manner in which the system’s resources are utilized.
Andri Setiyaji +3 more
semanticscholar +1 more source
Analyzing logs can aid in debugging or optimizing system performance. A comprehension of system efficacy is frequently linked to an awareness of the manner in which the system’s resources are utilized.
Andri Setiyaji +3 more
semanticscholar +1 more source
Comprehensive Analysis of Security Mechanisms Against SQL Injection Across Diverse Database Models
2024 International Conference on Integration of Emerging Technologies for the Digital World (ICIETDW)This report explores a variety of different security measures that aim to stop an SQL injection attacks among several database types including relational, graph, wide column, key-value and document stores.
Sathishkumar +2 more
semanticscholar +1 more source
A diligent survey of SQL injection attacks, detection and evaluation of mitigation techniques
2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)Today cyber security is a vast and most influenceable part of system security. This research provides detailed study of Sql injection and its various types.
Nilima D. Bobade +2 more
semanticscholar +1 more source
Analysis of SQL injection attacks in the cloud and in WEB applications
Security and PrivacyCloud computing has revolutionized the way IT industries work. Most modern‐day companies rely on cloud services to accomplish their day‐to‐day tasks. From hosting websites to developing platforms and storing resources, cloud computing has tremendous use ...
Animesh Kumar +2 more
semanticscholar +1 more source
SQL injection prevention system
2016 International Conference Radio Electronics & Info Communications (UkrMiCo), 2016Existing vulnerabilities of Web system threaten the regular work of information systems. The most common Web system vulnerability is SQL injection. There is known approaches to protect Web applications against SQL injection attacks in the article. To improve the Web software security it is developed defense mechanism that protects Web resources from ...
O. P. Voitovych +2 more
openaire +1 more source
SQL-Identifier Injection Attacks
2019 IEEE Conference on Communications and Network Security (CNS), 2019This paper defines a class of SQL-injection attacks that are based on injecting identifiers, such as table and column names, into SQL statements. An automated analysis of GitHub shows that 15.7% of 120,412 posted Java source files contain code vulnerable to SQL-Identifier Injection Attacks (SQL-IDIAs).
Cagri Cetin, Dmitry Goldgof, Jay Ligatti
openaire +1 more source
SQL Injection Attacks Countermeasures
2012Due to the huge growth in the need for using Web applications worldwide, there have been huge efforts from programmers to develop and implement new Web applications to be used by companies. Since a number of these applications lack proper security considerations, malicious users will be able to gain unauthorized access to confidential information of ...
Kasra Amirtahmasebi +1 more
openaire +1 more source
Η διπλωματική εργασία Επιθέσεις SQL Injection αναλύει τις επιθέσεις SQL Injection, τις μεθόδους που χρησιμοποιούνται, τις επιπτώσεις τους και τους τρόπους αντιμετώπισης. Αρχικά, παρουσιάζεται η γλώσσα SQL και οι κύριες κατηγορίες εντολών της (DDL, DML, DCL, TCL), που χρησιμοποιούνται για τη διαχείριση και τον έλεγχο των βάσεων δεδομένων.
openaire +1 more source
openaire +1 more source

