Detecting SQL injection attacks by binary gray wolf optimizer and machine learning algorithms
SQL injection is one of the important security issues in web applications because it allows an attacker to interact with the application's database. SQL injection attacks can be detected using machine learning algorithms. The effective features should be
Bahman Arasteh +5 more
semanticscholar +1 more source
TopoMAS: Large Language Model Driven Topological Materials Multi‐Agent System
TopoMAS is an interactive multi‐agent framework that revolutionizes topological materials discovery through human–AI collaborative intelligence. The system integrates natural language processing, knowledge retrieval from literature and databases, crystal structure generation, and automated first‐principles calculations within a unified workflow.
Baohua Zhang +5 more
wiley +1 more source
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma +4 more
wiley +1 more source
Conversion of conventional gravitational-wave interferometers into QND interferometers by modifying their input and/or output optics [PDF]
The LIGO-II gravitational-wave interferometers (ca. 2006--2008) are designed to have sensitivities at about the standard quantum limit (SQL) near 100 Hz. This paper describes and analyzes possible designs for subsequent, LIGO-III interferometers that can
A. Dorsel +47 more
core +3 more sources
A deep learning approach based on multi-view consensus for SQL injection detection
SQL injection (SQLi) attacks are one of the oldest and most serious security threats, consistently ranking among the top ten critical web security risks. Traditional defense mechanisms against SQL injection predominantly use blacklists to disallow common
A. Kakisim
semanticscholar +1 more source
Self‐Driving Development of Perfusion Processes for Monoclonal Antibody Production
ABSTRACT The development of autonomous agents in bioprocess development is crucial for advancing biopharma innovation. Time and resources required to develop and transfer a process for clinical material generation can be significantly decreased. While robotics and machine learning have greatly accelerated drug discovery and initial screening, the later
Chethana Janardhana Gadiyar +10 more
wiley +1 more source
Deep Learning in Cybersecurity: A Hybrid BERT-LSTM Network for SQL Injection Attack Detection
In the past decade, cybersecurity has become increasingly significant, driven largely by the increase in cybersecurity threats. Among these threats, SQL injection attacks stand out as a particularly common method of cyber attack.
Yixian Liu, Yupeng Dai
semanticscholar +1 more source
A SQL Injection Detection Method Based on Adaptive Deep Forest
Injection attack is the first of the top 10 security threats announced by the OWASP. Meanwhile, SQL injection is one of the most important types among the injection attacks.
Qi Li +3 more
doaj +1 more source
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application [PDF]
SQL injection Hotspots (SQLiHs) are Application’s Entry Points (AEPs) through which SQL injection is possible, subject to the application’s internal sanitization or validation capabilities.
Abdullah @ Selimun, Mohd Taufik +4 more
core +1 more source
Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand,
Fahad M. Alotaibi, V. Vassilakis
semanticscholar +1 more source

