Results 51 to 60 of about 23,541 (235)

SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning

open access: yesFuture Internet, 2023
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL ...
Yuting Guan   +4 more
doaj   +1 more source

A Method for the Quality‐Aware Automated Selection of Deployment Technologies

open access: yesSoftware: Practice and Experience, Volume 55, Issue 11, Page 1855-1876, November 2025.
ABSTRACT Domain The deployment of distributed multi‐component cloud applications typically requires a combination of multiple heterogeneous deployment technologies. A different combination of deployment technologies should be chosen due to varying deployment qualities, such as the functional suitability and reliability of the deployment technologies ...
Miles Stötzner   +7 more
wiley   +1 more source

Implementasi Intrusion Prevention System (IPS) Menggunakan Suricata Untuk Serangan SQL Injection

open access: yesTechne, 2022
Intrusion Prevention System (IPS) merupakan salah satu tool pengamanan pada jaringan. Pada penelitian ini Suricata sebagai IPS untuk melindungi webserver dari serangan SQL Injection menggunakan SQLMap dengan melihat efektifitas rules dan parameter ...
Faula Tanang Anugrah   +2 more
doaj   +1 more source

SQL Injection in Oracle: An Exploration of Vulnerabilities [PDF]

open access: yes, 2012
Structured Query Language (SQL) injection is one of the most devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL Injection can compromise usernames, passwords,
Ansari, Sid, Sykes, Edward R.
core  

An Injection with Tree Awareness: Adding Staircase Join to PostgreSQL [PDF]

open access: yes, 2004
The syntactic wellformedness constraints of XML (opening and closing tags nest properly) imply that XML processors face the challenge to efficiently handle data that takes the shape of ordered, unranked trees.
Grust, Torsten   +3 more
core   +5 more sources

A Modular Dynamic Probabilistic Risk Assessment Framework for Electric Grid Cybersecurity

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This paper presents a modular framework designed for dynamic probabilistic risk assessment of electric grid systems facing cybersecurity threats. The functionality and efficacy of the framework have been demonstrated using an IEEE 14‐bus system in a case study.
Xiaoxu Diao   +6 more
wiley   +1 more source

SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN

open access: yesIEEE Access, 2019
An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security Project (OWASP).
Xin Xie   +4 more
doaj   +1 more source

A Comprehensive Framework for Testing Goal‐Oriented NFPs in Software Product Lines

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 10, October 2025.
Testing non‐functional properties (NFPs) is often underprioritized in software product line engineering (SPLE), leading to significant quality risks. This paper introduces a comprehensive framework utilizing goal models for testing NFPs in software product lines developed with the feature and goal model approach. The framework offers solutions to three
Ibtesam Bashir Gwasem
wiley   +1 more source

Proposed Method to Prevent SQL Injection Attack

open access: yesIraqi Journal for Computers and Informatics, 2016
the internet and its websites have huge using these days. These webs may have sensitive and secret information like military information, financial information and other important information that transfer through the networks.
Makera Aziz, Dena Ahmed
doaj   +1 more source

Home - About - Disclaimer - Privacy