Results 61 to 70 of about 23,094 (187)
SQLMVED: SQL injection runtime prevention system based on multi-variant execution
The effectiveness of combining SQL statement parsing with randomization to defend against SQL injection attack (SQLIA) was based on the fact that attackers did not know about the current method of randomization adopted by system.Therefore, once attackers
Bolin MA +3 more
doaj +2 more sources
SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core +1 more source
Abstract Background Preparing retrospective dose data for risk modeling using large study cohorts can be time consuming as it often requires patient‐wise manual interventions. This is especially the case when considering organs at risk (OARs) not systematically delineated historically.
Louise Mövik +5 more
wiley +1 more source
Perancangan Keamanan Sistem Menggunakan Algoritma Honeypot pada Aplikasi Krs Online (Studi Kasus : Sekolah Tinggi Teknologi Adisutjipto) [PDF]
Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force.
Sajati, H. (Haruno) +2 more
core
A wireless cortical surface implant employing graphene electrode arrays diagnoses and alleviates Parkinson's disease symptoms in freely moving animals. The device continuously monitors cortical activity and delivers targeted stimulation, restoring beta–gamma and delta oscillations.
Hongseong Shin +15 more
wiley +1 more source
Long short‐term memory on abstract syntax tree for SQL injection detection
SQL injection attack (SQLIA) is a code injection technique, used to attack data‐driven applications by executing malicious SQL statements. Techniques like pattern matching, software testing and grammar analysis etc.
Z. Zhuo, T. Cai, X. Zhang, F. Lv
doaj +1 more source
Establishment of a Protocol for CE‐MS Based Peptidome Analysis of Human Saliva
ABSTRACT Proteins and peptides indicate physiological or pathological states and are investigated to identify markers to scrutinize health and disease surveillance. Saliva contains many proteins and peptides that could serve as biomarkers, offering a potential noninvasive approach for disease detection.
Carl‐Johan Törnhage +6 more
wiley +1 more source
Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified.
Bahman Arasteh +3 more
doaj +1 more source
Статический анализ кода мобильных приложений как средство выявления его уязвимостей [PDF]
В статье рассмотрен статический анализ исходного кода программ для мобильных платформ как одно из средств обеспечения безопасности мобильных систем. Проанализированы различные сценарии практического применения такого рода анализатора в качестве средства ...
Цыганенко, Никита Павлович
core
How Can Cryptography Secure Online Assessments Against Academic Dishonesty?
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi +2 more
wiley +1 more source

