Results 41 to 50 of about 23,094 (187)

A SQL Injection Detection Method Based on Adaptive Deep Forest

open access: yesIEEE Access, 2019
Injection attack is the first of the top 10 security threats announced by the OWASP. Meanwhile, SQL injection is one of the most important types among the injection attacks.
Qi Li   +3 more
doaj   +1 more source

A Modular Dynamic Probabilistic Risk Assessment Framework for Electric Grid Cybersecurity

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This paper presents a modular framework designed for dynamic probabilistic risk assessment of electric grid systems facing cybersecurity threats. The functionality and efficacy of the framework have been demonstrated using an IEEE 14‐bus system in a case study.
Xiaoxu Diao   +6 more
wiley   +1 more source

Algorithms and software solutions for SQL injection vulnerability testing in web applications

open access: diamondВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, 2018
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk   +3 more
openalex   +4 more sources

SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity

open access: yesIEEE Access
SQL (Structured Query Language) injection is one of the most prevalent and dangerous forms of cyber-attacks, posing significant threats to database management systems and the overall security of web applications.
Debendra Muduli   +6 more
doaj   +1 more source

SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning

open access: yesFuture Internet, 2023
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL ...
Yuting Guan   +4 more
doaj   +1 more source

Tool for SQL Injection Vulnerability Detection [PDF]

open access: yes, 2013
Bakalářská práce je zaměřena na problematiku bezpečnostní chyby SQL injection. V práci jsou popsány běžně používané postupy při útocích na informační systémy a jsou také probrány možnosti obrany včetně uvedení způsobů správné validace vstupů aplikace ...
Kutypa, Matouš
core  

Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application [PDF]

open access: yes, 2016
SQL injection Hotspots (SQLiHs) are Application’s Entry Points (AEPs) through which SQL injection is possible, subject to the application’s internal sanitization or validation capabilities.
Abdullah @ Selimun, Mohd Taufik   +4 more
core   +1 more source

A Comprehensive Framework for Testing Goal‐Oriented NFPs in Software Product Lines

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 10, October 2025.
Testing non‐functional properties (NFPs) is often underprioritized in software product line engineering (SPLE), leading to significant quality risks. This paper introduces a comprehensive framework utilizing goal models for testing NFPs in software product lines developed with the feature and goal model approach. The framework offers solutions to three
Ibtesam Bashir Gwasem
wiley   +1 more source

SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN

open access: yesIEEE Access, 2019
An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security Project (OWASP).
Xin Xie   +4 more
doaj   +1 more source

A Survey on SQL Injection Attacks Types & their Prevention Techniques

open access: yesJISR on Computing, 2023
In the world of connectedness even more than ever before we are using digital technologies in daily life from bank transactions to social networking.
Jibran Rasheed Khan   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy