Results 71 to 80 of about 22,704 (203)
IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks
The Internet of Things (IoT) technology is everywhere; they are making things more intelligent and connected, from smart cities to transport systems to homes, especially in the healthcare industry. This paper focuses on IoT in the healthcare domain.
Mohammed Mohammed Raoof +2 more
doaj +1 more source
Blocking SQL Injection in Database Stored Procedures [PDF]
This thesis contains a summary of all the work that has been done by us for the B-Tech project in the academic session of 2009-2010. The area chosen for the project was SQL Injection attacks and methods to prevent them, and this thesis goes on to ...
Panchamukhi, S, Sarangi, A
core
Abstract Submarine groundwater discharge (SGD) is a significant source of nutrients to continental shelf waters. Increasing evidence suggests that most of this flow is saline (∼seawater salinity) and occurs across broad continental shelves, making it challenging to observe.
Jacob Vincent +7 more
wiley +1 more source
TrafficRobot: An AI Agent Framework for Urban Traffic Management
ABSTRACT As urbanisation accelerates, traditional Intelligent Transportation Systems (ITSs), reliant on manual monitoring and rule‐based logic, struggle to manage increasingly complex and dynamic traffic conditions. This study proposes TrafficRobot, a hierarchical AI agent framework that implements a closed‐loop control flow for urban traffic ...
Xiaohua Liu +3 more
wiley +1 more source
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando +4 more
core +1 more source
AI‐Powered Defense: Leveraging Deep Learning for Effective Malware Detection
Traditional malware detection techniques frequently fail to detect and stop malicious activity in an era where cyber threats are becoming more complex. Any software that enters a computer system without the administrator’s consent is considered malicious software.
Nancy Awadallah Awad +1 more
wiley +1 more source
HYBRID INTRUSION DETECTION SYSTEM USING FUZZY LOGIC INFERENCE ENGINE FOR SQL INJECTION ATTACK
SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (
Rajif Agung Yunmar
doaj +1 more source
Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa +5 more
wiley +1 more source
CODDLE: Code-Injection Detection With Deep Learning
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj +1 more source
A Knowledge Reuse–Based Approach for Rapid Design of an Active Phased Array Antenna
Active phased array antenna is a typical multidisciplinary, intensive knowledge‐based equipment, and the traditional “design–analysis–improvement–redesign” method has problems including low utilization of mature design resources and long design cycles, and it is difficult to meet the efficient design needs of antennas. Active phased array antenna has a
Yan Wang +10 more
wiley +1 more source

