Results 21 to 30 of about 22,704 (203)

Some security issues for web based frameworks [PDF]

open access: yes, 2010
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core   +1 more source

Generation of amplitude-squeezed light from a room-temperature Fabry-Perot semiconductor laser [PDF]

open access: yes, 1995
Amplitude-squeezed light with intensity fluctuations 29% below the standard quantum limit (SQL) is produced from a pump-suppressed room-temperature semiconductor laser, corresponding to 41% below the SQL after correction for detection efficiency. Excess
Kitching, J., Provenzano, D., Yariv, A.
core   +1 more source

A Static Detection Method for SQL Injection Vulnerability Based on Program Transformation

open access: yesApplied Sciences, 2023
Static analysis is popular for detecting SQL injection vulnerabilities. However, due to the lack of accurate modeling of object-oriented database extensions, current methods fail to accurately detect SQL injection vulnerabilities in applications that use
Ye Yuan   +5 more
doaj   +1 more source

PachyRand: SQL Randomization for the PostgreSQL JDBC Driver [PDF]

open access: yes, 2005
Many websites are driven by web applications that deliver dynamic content stored in SQL databases. Such systems take input directly from the client via HTML forms.
Keromytis, Angelos D.   +1 more
core   +2 more sources

A Systematic Literature Review on SQL Injection Attacks

open access: yesNUML International Journal of Engineering and Computing
With the increasing use of web applications, concerns for data integrity and security have increased manifolds in the current time. The growth in quantity of internet clients and sites has made the web security circumstances progressively extreme ...
Maryam Mehmood, Asad Ijaz
doaj   +1 more source

Research on SQL injection detection technology based on SVM

open access: yesMATEC Web of Conferences, 2018
SQL injection, which has the characteristics of great harm and fast variation, has always ranked the top of the OWASP TOP 10, which has always been a hot spot in the research of web security.
Chen Zhuang, Guo Min, zhou Lin
doaj   +1 more source

Analysis of protection capabilities against SQL Injection attacks

open access: yesJournal of Computer Sciences Institute, 2018
Publication refers to SQL Injection attacks whose are one of the most dangerous in a cyberspace. Based on a literature studies, classification of the SQL Injection attacks was prepared.
Bogdan Krawczyński   +2 more
doaj   +1 more source

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

Basic database performance tuning - developer's perspective [PDF]

open access: yes, 2008
This lecture discusses selected database performance issues from the developer's point of view: connection overhead, bind variables and SQL injection, making most of the optimizer with up-to-date statistics, reading execution plans.
Kwiatek, Michal
core   +1 more source

Penetration test method using blind SQL injection based on second-order fragment and reassembly

open access: yesTongxin xuebao, 2017
How to get rid of the blindness of current SQL injection penetration test,produce the optimized attack pattern of SQL injection,enhance the effectiveness in the phase of attack generation,and improve the accuracy of vulnerability detection of SQL ...
De-guang LE   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy