Results 51 to 60 of about 22,704 (203)
Large Language Models for Explainable Medical Text Summarization: A Systematic Literature Review
The graphical abstract highlights the three key aspects addressed in this review: the technical background of medical text summarization methods relevant to clinical decision support; the LLM background in providing context for its diagnosis and clinical significance; and clinical decision support with summarization and explainability in patient care ...
Aleka Melese Ayalew +3 more
wiley +1 more source
SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN
An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security Project (OWASP).
Xin Xie +4 more
doaj +1 more source
SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL ...
Yuting Guan +4 more
doaj +1 more source
SQL injection vulnerability analysis
Web applications are an integral part of today's digital landscape, serving various functions from e-commerce to social networking. However, they are also prime targets for cyber-attacks, with SQL-Injection vulnerabilities posing a significant threat to their security.
null Smithu B S +2 more
openaire +1 more source
SQL Injection attack roadmap and fusion [PDF]
With SQL Injection, an attacker can change the intended effect of dynamically generated query in a web Application. This can lead to unauthorized access to the database underlying web application, and harmful transactions on the potentially sensitive ...
Abdullah @ Selimun, Mohd Taufik +4 more
core +1 more source
Abstract Erythropoietin (EPO) administration stimulates haematological and non‐haematological adaptations that alter substrate oxidation and enhance aerobic performance. The effects of strenuous exercise and EPO on metabolites, and whether any effect is associated with haematological and non‐haematological adaptations, has not been assessed.
Devin J. Drummer +11 more
wiley +1 more source
Implementasi Intrusion Prevention System (IPS) Menggunakan Suricata Untuk Serangan SQL Injection
Intrusion Prevention System (IPS) merupakan salah satu tool pengamanan pada jaringan. Pada penelitian ini Suricata sebagai IPS untuk melindungi webserver dari serangan SQL Injection menggunakan SQLMap dengan melihat efektifitas rules dan parameter ...
Faula Tanang Anugrah +2 more
doaj +1 more source
An Injection with Tree Awareness: Adding Staircase Join to PostgreSQL [PDF]
The syntactic wellformedness constraints of XML (opening and closing tags nest properly) imply that XML processors face the challenge to efficiently handle data that takes the shape of ordered, unranked trees.
Grust, Torsten +3 more
core +5 more sources
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core +1 more source

