Results 41 to 50 of about 22,704 (203)

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity

open access: yesIEEE Access
SQL (Structured Query Language) injection is one of the most prevalent and dangerous forms of cyber-attacks, posing significant threats to database management systems and the overall security of web applications.
Debendra Muduli   +6 more
doaj   +1 more source

Semaglutide 2.4 mg Cardiometabolic Long‐Term Effects in Patients With Obesity or Overweight in a Real‐World Setting: A Retrospective Cohort Study in the United States (SMILE)

open access: yesDiabetes, Obesity and Metabolism, EarlyView.
ABSTRACT Aims To evaluate the real‐world associations between semaglutide 2.4 mg and cardiometabolic comorbidities, biomarkers and cardiovascular risk among adults with overweight or obesity. Methods This retrospective cohort study used US claims data and laboratory measurements from the Komodo Research Database (2016–2024). Adults with obesity or with
Aleksandrina Ruseva   +11 more
wiley   +1 more source

Quantum noise in gravitational-wave interferometers: Overview and recent developments [PDF]

open access: yes, 2003
We present an overview of quantum noise in gravitational wave interferometers. Gravitational wave detectors are extensively modified variants of a Michelson interferometer and the quantum noise couplings are strongly influenced by the interferometer ...
Corbitt, Thomas, Mavalvala, Nergis
core   +4 more sources

Tool for SQL Injection Vulnerability Detection [PDF]

open access: yes, 2013
Bakalářská práce je zaměřena na problematiku bezpečnostní chyby SQL injection. V práci jsou popsány běžně používané postupy při útocích na informační systémy a jsou také probrány možnosti obrany včetně uvedení způsobů správné validace vstupů aplikace ...
Kutypa, Matouš
core  

Multi-layer Architecture For Storing Visual Data Based on WCF and Microsoft SQL Server Database

open access: yes, 2015
In this paper we present a novel architecture for storing visual data. Effective storing, browsing and searching collections of images is one of the most important challenges of computer science.
A. Biniaz   +22 more
core   +1 more source

Joint measurement of multiple noncommuting parameters [PDF]

open access: yes, 2018
Although quantum metrology allows us to make precision measurements beyond the standard quantum limit, it mostly works on the measurement of only one observable due to the Heisenberg uncertainty relation on the measurement precision of noncommuting ...
Assad, Syed M.   +6 more
core   +3 more sources

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

A Survey on SQL Injection Attacks Types & their Prevention Techniques

open access: yesJISR on Computing, 2023
In the world of connectedness even more than ever before we are using digital technologies in daily life from bank transactions to social networking.
Jibran Rasheed Khan   +2 more
doaj   +1 more source

SQL Injection in Oracle: An Exploration of Vulnerabilities [PDF]

open access: yes, 2012
Structured Query Language (SQL) injection is one of the most devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL Injection can compromise usernames, passwords,
Ansari, Sid, Sykes, Edward R.
core  

Home - About - Disclaimer - Privacy