Results 71 to 80 of about 22,704 (203)

IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks

open access: yesThe Journal of Engineering
The Internet of Things (IoT) technology is everywhere; they are making things more intelligent and connected, from smart cities to transport systems to homes, especially in the healthcare industry. This paper focuses on IoT in the healthcare domain.
Mohammed Mohammed Raoof   +2 more
doaj   +1 more source

Blocking SQL Injection in Database Stored Procedures [PDF]

open access: yes, 2010
This thesis contains a summary of all the work that has been done by us for the B-Tech project in the academic session of 2009-2010. The area chosen for the project was SQL Injection attacks and methods to prevent them, and this thesis goes on to ...
Panchamukhi, S, Sarangi, A
core  

Annual Weather Patterns Drive Large Pulses of Saline Submarine Groundwater Discharge and Major Summer Inputs of Nutrients to the South Atlantic Bight

open access: yesJournal of Geophysical Research: Oceans, Volume 131, Issue 1, January 2026.
Abstract Submarine groundwater discharge (SGD) is a significant source of nutrients to continental shelf waters. Increasing evidence suggests that most of this flow is saline (∼seawater salinity) and occurs across broad continental shelves, making it challenging to observe.
Jacob Vincent   +7 more
wiley   +1 more source

TrafficRobot: An AI Agent Framework for Urban Traffic Management

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
ABSTRACT As urbanisation accelerates, traditional Intelligent Transportation Systems (ITSs), reliant on manual monitoring and rule‐based logic, struggle to manage increasingly complex and dynamic traffic conditions. This study proposes TrafficRobot, a hierarchical AI agent framework that implements a closed‐loop control flow for urban traffic ...
Xiaohua Liu   +3 more
wiley   +1 more source

A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)

open access: yes, 2017
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando   +4 more
core   +1 more source

AI‐Powered Defense: Leveraging Deep Learning for Effective Malware Detection

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2026, Issue 1, 2026.
Traditional malware detection techniques frequently fail to detect and stop malicious activity in an era where cyber threats are becoming more complex. Any software that enters a computer system without the administrator’s consent is considered malicious software.
Nancy Awadallah Awad   +1 more
wiley   +1 more source

HYBRID INTRUSION DETECTION SYSTEM USING FUZZY LOGIC INFERENCE ENGINE FOR SQL INJECTION ATTACK

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2018
SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (
Rajif Agung Yunmar
doaj   +1 more source

Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa   +5 more
wiley   +1 more source

CODDLE: Code-Injection Detection With Deep Learning

open access: yesIEEE Access, 2019
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj   +1 more source

A Knowledge Reuse–Based Approach for Rapid Design of an Active Phased Array Antenna

open access: yesInternational Journal of Antennas and Propagation, Volume 2026, Issue 1, 2026.
Active phased array antenna is a typical multidisciplinary, intensive knowledge‐based equipment, and the traditional “design–analysis–improvement–redesign” method has problems including low utilization of mature design resources and long design cycles, and it is difficult to meet the efficient design needs of antennas. Active phased array antenna has a
Yan Wang   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy