Results 51 to 60 of about 23,094 (187)
Automated vulnerability evaluation with large language models and vulnerability ontologies
Abstract The National Vulnerability Database (NVD) publishes over a thousand new vulnerabilities monthly, with a projected 25 percent increase in 2024, highlighting the crucial need for rapid vulnerability identification to mitigate cybersecurity attacks and save costs and resources.
Rikhiya Ghosh +5 more
wiley +1 more source
An Injection with Tree Awareness: Adding Staircase Join to PostgreSQL [PDF]
The syntactic wellformedness constraints of XML (opening and closing tags nest properly) imply that XML processors face the challenge to efficiently handle data that takes the shape of ordered, unranked trees.
Grust, Torsten +3 more
core +5 more sources
ABSTRACT The development of an in‐house accounting bot—an artificial intelligence (AI) assistant capable of generating internally structured bookkeeping double‐entry posting schemes—is explored in this paper. The processes of curating a suitable dataset, selecting, and fine‐tuning a seven‐billion‐parameter language model, categorized as a small ...
Mario Zupan
wiley +1 more source
SQL Injection in Oracle: An Exploration of Vulnerabilities [PDF]
Structured Query Language (SQL) injection is one of the most devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL Injection can compromise usernames, passwords,
Ansari, Sid, Sykes, Edward R.
core
Proposed Method to Prevent SQL Injection Attack
the internet and its websites have huge using these days. These webs may have sensitive and secret information like military information, financial information and other important information that transfer through the networks.
Makera Aziz, Dena Ahmed
doaj +1 more source
Hydrothermally Induced Refractory DOC Sinks in the Deep Pacific Ocean
Abstract Dissolved organic carbon (DOC) constitutes the largest pool of reduced carbon in the global ocean, with important contributions from both recently formed and aged, biologically refractory DOC (RDOC). The mechanisms regulating RDOC transformation and removal remain uncertain though hydrothermal vents have been identified as sources and sinks ...
D. A. Hansell +6 more
wiley +1 more source
Tempus is a testing system that enhances Evolutionary Mutation Testing (EMT) by using ProfileBased individual generation (PBig). PBig generates new individuals based on previous knowledge from other programs about which operators are more likely to produce strong mutants.
Lorena Gutiérrez‐Madroñal +2 more
wiley +1 more source
Blocking SQL Injection in Database Stored Procedures [PDF]
This thesis contains a summary of all the work that has been done by us for the B-Tech project in the academic session of 2009-2010. The area chosen for the project was SQL Injection attacks and methods to prevent them, and this thesis goes on to ...
Panchamukhi, S, Sarangi, A
core
ADAPT‐marketplace – A web‐application for XML‐based template sharing in radiation oncology
Abstract Purpose The adaption of radiotherapy (RT) plans in response to anatomical and physiological changes during treatment marks a significant shift toward personalized cancer care. However, the complexity of Online Adaptive Radiotherapy (OART) procedures often leads to variability in treatment quality across institutions.
Dennis N. Stanley +7 more
wiley +1 more source
Using Nlp Techniques To Detect Sql Injection Attack
Most of the applications used on the internet are Web-Based Applications, that accept critical information from users and store this information in databases.
زاهر الشامي +1 more
doaj

