Results 51 to 60 of about 22,704 (203)

Large Language Models for Explainable Medical Text Summarization: A Systematic Literature Review

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The graphical abstract highlights the three key aspects addressed in this review: the technical background of medical text summarization methods relevant to clinical decision support; the LLM background in providing context for its diagnosis and clinical significance; and clinical decision support with summarization and explainability in patient care ...
Aleka Melese Ayalew   +3 more
wiley   +1 more source

SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN

open access: yesIEEE Access, 2019
An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security Project (OWASP).
Xin Xie   +4 more
doaj   +1 more source

SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning

open access: yesFuture Internet, 2023
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL ...
Yuting Guan   +4 more
doaj   +1 more source

SQL injection vulnerability analysis

open access: yesWorld Journal of Advanced Research and Reviews, 2021
Web applications are an integral part of today's digital landscape, serving various functions from e-commerce to social networking. However, they are also prime targets for cyber-attacks, with SQL-Injection vulnerabilities posing a significant threat to their security.
null Smithu B S   +2 more
openaire   +1 more source

SQL Injection attack roadmap and fusion [PDF]

open access: yes, 2016
With SQL Injection, an attacker can change the intended effect of dynamically generated query in a web Application. This can lead to unauthorized access to the database underlying web application, and harmful transactions on the potentially sensitive ...
Abdullah @ Selimun, Mohd Taufik   +4 more
core   +1 more source

Metabolomic responses are more sensitive in muscle than serum following 28 days of arduous exercise with erythropoietin administration

open access: yesExperimental Physiology, Volume 111, Issue 5, Page 2613-2626, 1 May 2026.
Abstract Erythropoietin (EPO) administration stimulates haematological and non‐haematological adaptations that alter substrate oxidation and enhance aerobic performance. The effects of strenuous exercise and EPO on metabolites, and whether any effect is associated with haematological and non‐haematological adaptations, has not been assessed.
Devin J. Drummer   +11 more
wiley   +1 more source

Implementasi Intrusion Prevention System (IPS) Menggunakan Suricata Untuk Serangan SQL Injection

open access: yesTechne, 2022
Intrusion Prevention System (IPS) merupakan salah satu tool pengamanan pada jaringan. Pada penelitian ini Suricata sebagai IPS untuk melindungi webserver dari serangan SQL Injection menggunakan SQLMap dengan melihat efektifitas rules dan parameter ...
Faula Tanang Anugrah   +2 more
doaj   +1 more source

An Injection with Tree Awareness: Adding Staircase Join to PostgreSQL [PDF]

open access: yes, 2004
The syntactic wellformedness constraints of XML (opening and closing tags nest properly) imply that XML processors face the challenge to efficiently handle data that takes the shape of ordered, unranked trees.
Grust, Torsten   +3 more
core   +5 more sources

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]

open access: yes, 2018
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core   +1 more source

Home - About - Disclaimer - Privacy