Results 71 to 80 of about 1,544,911 (270)

Combining Regular Expressions and Machine Learning for SQL Injection Detection in Urban Computing

open access: yesJournal of Internet Services and Applications
Given the vast amount of data generated in urban environments the rapid advancements in information technology urban environments and the continual advancements in information technology, several online urban services have emerged in recent years.
Michael S. Souza   +4 more
semanticscholar   +1 more source

Modular architecture for traffic monitoring systems using 3D LiDAR sensors

open access: yesComputer-Aided Civil and Infrastructure Engineering, Volume 40, Issue 30, Page 5972-5990, 19 December 2025.
Abstract Urban growth has generated an increasing demand for robust and accurate traffic monitoring systems. Traditional technologies such as inductive loops and computer vision have limitations under adverse environmental conditions and in high‐density traffic scenarios.
A. Cruz   +3 more
wiley   +1 more source

SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN

open access: yesIEEE Access, 2019
An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security Project (OWASP).
Xin Xie   +4 more
doaj   +1 more source

An Injection with Tree Awareness: Adding Staircase Join to PostgreSQL [PDF]

open access: yes, 2004
The syntactic wellformedness constraints of XML (opening and closing tags nest properly) imply that XML processors face the challenge to efficiently handle data that takes the shape of ordered, unranked trees.
Grust, Torsten   +3 more
core   +5 more sources

A Comprehensive Survey on LLM‐Based Network Management and Operations

open access: yesInternational Journal of Network Management, Volume 35, Issue 6, November/December 2025.
ABSTRACT The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule‐based methods, adopting advanced artificial intelligence (AI)‐driven
Jibum Hong   +2 more
wiley   +1 more source

Proposed Method to Prevent SQL Injection Attack

open access: yesIraqi Journal for Computers and Informatics, 2016
the internet and its websites have huge using these days. These webs may have sensitive and secret information like military information, financial information and other important information that transfer through the networks.
Makera Aziz, Dena Ahmed
doaj   +1 more source

A Method for the Quality‐Aware Automated Selection of Deployment Technologies

open access: yesSoftware: Practice and Experience, Volume 55, Issue 11, Page 1855-1876, November 2025.
ABSTRACT Domain The deployment of distributed multi‐component cloud applications typically requires a combination of multiple heterogeneous deployment technologies. A different combination of deployment technologies should be chosen due to varying deployment qualities, such as the functional suitability and reliability of the deployment technologies ...
Miles Stötzner   +7 more
wiley   +1 more source

Blocking SQL Injection in Database Stored Procedures [PDF]

open access: yes, 2010
This thesis contains a summary of all the work that has been done by us for the B-Tech project in the academic session of 2009-2010. The area chosen for the project was SQL Injection attacks and methods to prevent them, and this thesis goes on to ...
Panchamukhi, S, Sarangi, A
core  

A Modular Dynamic Probabilistic Risk Assessment Framework for Electric Grid Cybersecurity

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This paper presents a modular framework designed for dynamic probabilistic risk assessment of electric grid systems facing cybersecurity threats. The functionality and efficacy of the framework have been demonstrated using an IEEE 14‐bus system in a case study.
Xiaoxu Diao   +6 more
wiley   +1 more source

Using Nlp Techniques To Detect Sql Injection Attack

open access: yesمجلة جامعة دمشق للعلوم الهندسية, 2023
Most of the applications used on the internet are Web-Based Applications, that accept critical information from users and store this information in databases.
زاهر الشامي   +1 more
doaj  

Home - About - Disclaimer - Privacy