A SQL Injection Detection Method Based on Adaptive Deep Forest
Injection attack is the first of the top 10 security threats announced by the OWASP. Meanwhile, SQL injection is one of the most important types among the injection attacks.
Qi Li +3 more
doaj +1 more source
A Modular Dynamic Probabilistic Risk Assessment Framework for Electric Grid Cybersecurity
This paper presents a modular framework designed for dynamic probabilistic risk assessment of electric grid systems facing cybersecurity threats. The functionality and efficacy of the framework have been demonstrated using an IEEE 14‐bus system in a case study.
Xiaoxu Diao +6 more
wiley +1 more source
Algorithms and software solutions for SQL injection vulnerability testing in web applications
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk +3 more
openalex +4 more sources
SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity
SQL (Structured Query Language) injection is one of the most prevalent and dangerous forms of cyber-attacks, posing significant threats to database management systems and the overall security of web applications.
Debendra Muduli +6 more
doaj +1 more source
SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL ...
Yuting Guan +4 more
doaj +1 more source
Tool for SQL Injection Vulnerability Detection [PDF]
Bakalářská práce je zaměřena na problematiku bezpečnostní chyby SQL injection. V práci jsou popsány běžně používané postupy při útocích na informační systémy a jsou také probrány možnosti obrany včetně uvedení způsobů správné validace vstupů aplikace ...
Kutypa, Matouš
core
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application [PDF]
SQL injection Hotspots (SQLiHs) are Application’s Entry Points (AEPs) through which SQL injection is possible, subject to the application’s internal sanitization or validation capabilities.
Abdullah @ Selimun, Mohd Taufik +4 more
core +1 more source
A Comprehensive Framework for Testing Goal‐Oriented NFPs in Software Product Lines
Testing non‐functional properties (NFPs) is often underprioritized in software product line engineering (SPLE), leading to significant quality risks. This paper introduces a comprehensive framework utilizing goal models for testing NFPs in software product lines developed with the feature and goal model approach. The framework offers solutions to three
Ibtesam Bashir Gwasem
wiley +1 more source
SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN
An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security Project (OWASP).
Xin Xie +4 more
doaj +1 more source
A Survey on SQL Injection Attacks Types & their Prevention Techniques
In the world of connectedness even more than ever before we are using digital technologies in daily life from bank transactions to social networking.
Jibran Rasheed Khan +2 more
doaj +1 more source

