Perancangan Keamanan Sistem Menggunakan Algoritma Honeypot pada Aplikasi Krs Online (Studi Kasus : Sekolah Tinggi Teknologi Adisutjipto) [PDF]
Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force.
Sajati, H. (Haruno) +2 more
core
SQL Injection Detection using Machine Learning: A Review
SQL injection attacks are critical security vulnerability exploitation in web applications, posing risks to data, if successfully executed, allowing attackers to gain unauthorised access to sensitive data.
Mohammed A M Oudah +2 more
semanticscholar +1 more source
A Comprehensive Framework for Testing Goal‐Oriented NFPs in Software Product Lines
Testing non‐functional properties (NFPs) is often underprioritized in software product line engineering (SPLE), leading to significant quality risks. This paper introduces a comprehensive framework utilizing goal models for testing NFPs in software product lines developed with the feature and goal model approach. The framework offers solutions to three
Ibtesam Bashir Gwasem
wiley +1 more source
Automated vulnerability evaluation with large language models and vulnerability ontologies
Abstract The National Vulnerability Database (NVD) publishes over a thousand new vulnerabilities monthly, with a projected 25 percent increase in 2024, highlighting the crucial need for rapid vulnerability identification to mitigate cybersecurity attacks and save costs and resources.
Rikhiya Ghosh +5 more
wiley +1 more source
SQLMVED: SQL injection runtime prevention system based on multi-variant execution
The effectiveness of combining SQL statement parsing with randomization to defend against SQL injection attack (SQLIA) was based on the fact that attackers did not know about the current method of randomization adopted by system.Therefore, once attackers
Bolin MA +3 more
doaj +2 more sources
IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks
The Internet of Things (IoT) technology is everywhere; they are making things more intelligent and connected, from smart cities to transport systems to homes, especially in the healthcare industry. This paper focuses on IoT in the healthcare domain.
Mohammed Mohammed Raoof +2 more
doaj +1 more source
Статический анализ кода мобильных приложений как средство выявления его уязвимостей [PDF]
В статье рассмотрен статический анализ исходного кода программ для мобильных платформ как одно из средств обеспечения безопасности мобильных систем. Проанализированы различные сценарии практического применения такого рода анализатора в качестве средства ...
Цыганенко, Никита Павлович
core
PROGESI: A PROxy Grammar to Enhance Web Application Firewall for SQL Injection Prevention
A web application is prone to security threats due to its open nature. The security of these platforms is imperative for organizations of all sizes because they store sensitive information.
Anthony J. Coscia +4 more
semanticscholar +1 more source
ABSTRACT The development of an in‐house accounting bot—an artificial intelligence (AI) assistant capable of generating internally structured bookkeeping double‐entry posting schemes—is explored in this paper. The processes of curating a suitable dataset, selecting, and fine‐tuning a seven‐billion‐parameter language model, categorized as a small ...
Mario Zupan
wiley +1 more source
SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core +1 more source

