Results 61 to 70 of about 23,094 (187)

SQLMVED: SQL injection runtime prevention system based on multi-variant execution

open access: yesTongxin xuebao, 2021
The effectiveness of combining SQL statement parsing with randomization to defend against SQL injection attack (SQLIA) was based on the fact that attackers did not know about the current method of randomization adopted by system.Therefore, once attackers
Bolin MA   +3 more
doaj   +2 more sources

SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]

open access: yes, 2018
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core   +1 more source

A semi‐automated workflow for cohort‐wise preparation of radiotherapy data for dose‐response modeling, including autosegmentation of organs at risk

open access: yesJournal of Applied Clinical Medical Physics, Volume 26, Issue 7, July 2025.
Abstract Background Preparing retrospective dose data for risk modeling using large study cohorts can be time consuming as it often requires patient‐wise manual interventions. This is especially the case when considering organs at risk (OARs) not systematically delineated historically.
Louise Mövik   +5 more
wiley   +1 more source

Perancangan Keamanan Sistem Menggunakan Algoritma Honeypot pada Aplikasi Krs Online (Studi Kasus : Sekolah Tinggi Teknologi Adisutjipto) [PDF]

open access: yes, 2013
Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force.
Sajati, H. (Haruno)   +2 more
core  

A Wireless Cortical Surface Implant for Diagnosing and Alleviating Parkinson's Disease Symptoms in Freely Moving Animals

open access: yesAdvanced Healthcare Materials, Volume 14, Issue 17, July 4, 2025.
A wireless cortical surface implant employing graphene electrode arrays diagnoses and alleviates Parkinson's disease symptoms in freely moving animals. The device continuously monitors cortical activity and delivers targeted stimulation, restoring beta–gamma and delta oscillations.
Hongseong Shin   +15 more
wiley   +1 more source

Long short‐term memory on abstract syntax tree for SQL injection detection

open access: yesIET Software, 2021
SQL injection attack (SQLIA) is a code injection technique, used to attack data‐driven applications by executing malicious SQL statements. Techniques like pattern matching, software testing and grammar analysis etc.
Z. Zhuo, T. Cai, X. Zhang, F. Lv
doaj   +1 more source

Establishment of a Protocol for CE‐MS Based Peptidome Analysis of Human Saliva

open access: yesPROTEOMICS, Volume 25, Issue 13, July 2025.
ABSTRACT Proteins and peptides indicate physiological or pathological states and are investigated to identify markers to scrutinize health and disease surveillance. Saliva contains many proteins and peptides that could serve as biomarkers, offering a potential noninvasive approach for disease detection.
Carl‐Johan Törnhage   +6 more
wiley   +1 more source

Effective SQL Injection Detection: A Fusion of Binary Olympiad Optimizer and Classification Algorithm

open access: yesMathematics
Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified.
Bahman Arasteh   +3 more
doaj   +1 more source

Статический анализ кода мобильных приложений как средство выявления его уязвимостей [PDF]

open access: yes, 2015
В статье рассмотрен статический анализ исходного кода программ для мобильных платформ как одно из средств обеспечения безопасности мобильных систем. Проанализированы различные сценарии практического применения такого рода анализатора в качестве средства ...
Цыганенко, Никита Павлович
core  

How Can Cryptography Secure Online Assessments Against Academic Dishonesty?

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 4, July/August 2025.
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy