Results 61 to 70 of about 1,544,911 (270)

SQLi‐ScanEval: A Framework for Design and Evaluation of SQLi Detection Using Vulnerability and Penetration Testing Scanners

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
This paper proposes SQLi‐ScanEval Framework, a standardized SQLi detection system that integrates vulnerability and penetration testing scanners into a standardized framework. It tested seven prominent SQLi vulnerability scanners including OWASP ZAP, Wapiti, Vega, Acunetix, Invicti, Burp Suite, and Arachni on two prominent vulnerable testing ...
Hajira Bashir   +6 more
wiley   +1 more source

Tool for SQL Injection Vulnerability Detection [PDF]

open access: yes, 2013
Bakalářská práce je zaměřena na problematiku bezpečnostní chyby SQL injection. V práci jsou popsány běžně používané postupy při útocích na informační systémy a jsou také probrány možnosti obrany včetně uvedení způsobů správné validace vstupů aplikace ...
Kutypa, Matouš
core  

Securing Against Advanced Cyber Threats: A Comprehensive Guide to Phishing, XSS, and SQL Injection Defense

open access: yesJournal of Computer Science and Technology Studies
In an era dominated by digital connectivity, the proliferation of advanced cyber threats poses a formidable challenge to organizations worldwide. This comprehensive guide delves into the intricacies of safeguarding against three prevalent and insidious ...
Sunil Sukumaran Nair
semanticscholar   +1 more source

Annual Weather Patterns Drive Large Pulses of Saline Submarine Groundwater Discharge and Major Summer Inputs of Nutrients to the South Atlantic Bight

open access: yesJournal of Geophysical Research: Oceans, Volume 131, Issue 1, January 2026.
Abstract Submarine groundwater discharge (SGD) is a significant source of nutrients to continental shelf waters. Increasing evidence suggests that most of this flow is saline (∼seawater salinity) and occurs across broad continental shelves, making it challenging to observe.
Jacob Vincent   +7 more
wiley   +1 more source

A Survey on SQL Injection Attacks Types & their Prevention Techniques

open access: yesJISR on Computing, 2023
In the world of connectedness even more than ever before we are using digital technologies in daily life from bank transactions to social networking.
Jibran Rasheed Khan   +2 more
doaj   +1 more source

Open‐Source System Suitability: Mass Spectrometry Query Language Lab (MassQLab)

open access: yesRapid Communications in Mass Spectrometry, Volume 39, Issue 23, 15 December 2025.
ABSTRACT Rationale Reproducible analytical instrumentation system performance is critical for mass spectrometry, particularly metabolomics, aptly named system suitability testing. We identified a need based on literature reports that stated only 2% of papers performed system suitability testing.
Heather L. Winter   +2 more
wiley   +1 more source

Regional Differences in Soybean Protein and Amino Acid Profiles: A Genetic Exploration Using a Novel GWAS Panel

open access: yesLegume Science, Volume 7, Issue 4, December 2025.
ABSTRACT Regional differences in soybean seed protein and amino acid content in Canada present significant challenges for crop improvement and the market value of high‐protein livestock feed. This study employed genome‐wide association studies (GWAS) using a novel panel of 206 cultivars to investigate the genetic basis of regional variations.
Siwar Haidar   +19 more
wiley   +1 more source

SQL injection vulnerability analysis

open access: yesWorld Journal of Advanced Research and Reviews, 2021
Web applications are an integral part of today's digital landscape, serving various functions from e-commerce to social networking. However, they are also prime targets for cyber-attacks, with SQL-Injection vulnerabilities posing a significant threat to their security.
null Smithu B S   +2 more
openaire   +1 more source

Implementasi Intrusion Prevention System (IPS) Menggunakan Suricata Untuk Serangan SQL Injection

open access: yesTechne, 2022
Intrusion Prevention System (IPS) merupakan salah satu tool pengamanan pada jaringan. Pada penelitian ini Suricata sebagai IPS untuk melindungi webserver dari serangan SQL Injection menggunakan SQLMap dengan melihat efektifitas rules dan parameter ...
Faula Tanang Anugrah   +2 more
doaj   +1 more source

SQL Injection in Oracle: An Exploration of Vulnerabilities [PDF]

open access: yes, 2012
Structured Query Language (SQL) injection is one of the most devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL Injection can compromise usernames, passwords,
Ansari, Sid, Sykes, Edward R.
core  

Home - About - Disclaimer - Privacy