Results 81 to 90 of about 1,544,911 (270)

Perancangan Keamanan Sistem Menggunakan Algoritma Honeypot pada Aplikasi Krs Online (Studi Kasus : Sekolah Tinggi Teknologi Adisutjipto) [PDF]

open access: yes, 2013
Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force.
Sajati, H. (Haruno)   +2 more
core  

SQL Injection Detection using Machine Learning: A Review

open access: yesMalaysian Journal of Science Health & Technology
SQL injection attacks are critical security vulnerability exploitation in web applications, posing risks to data, if successfully executed, allowing attackers to gain unauthorised access to sensitive data.
Mohammed A M Oudah   +2 more
semanticscholar   +1 more source

A Comprehensive Framework for Testing Goal‐Oriented NFPs in Software Product Lines

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 10, October 2025.
Testing non‐functional properties (NFPs) is often underprioritized in software product line engineering (SPLE), leading to significant quality risks. This paper introduces a comprehensive framework utilizing goal models for testing NFPs in software product lines developed with the feature and goal model approach. The framework offers solutions to three
Ibtesam Bashir Gwasem
wiley   +1 more source

Automated vulnerability evaluation with large language models and vulnerability ontologies

open access: yesAI Magazine, Volume 46, Issue 3, Fall 2025.
Abstract The National Vulnerability Database (NVD) publishes over a thousand new vulnerabilities monthly, with a projected 25 percent increase in 2024, highlighting the crucial need for rapid vulnerability identification to mitigate cybersecurity attacks and save costs and resources.
Rikhiya Ghosh   +5 more
wiley   +1 more source

SQLMVED: SQL injection runtime prevention system based on multi-variant execution

open access: yesTongxin xuebao, 2021
The effectiveness of combining SQL statement parsing with randomization to defend against SQL injection attack (SQLIA) was based on the fact that attackers did not know about the current method of randomization adopted by system.Therefore, once attackers
Bolin MA   +3 more
doaj   +2 more sources

IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks

open access: yesThe Journal of Engineering
The Internet of Things (IoT) technology is everywhere; they are making things more intelligent and connected, from smart cities to transport systems to homes, especially in the healthcare industry. This paper focuses on IoT in the healthcare domain.
Mohammed Mohammed Raoof   +2 more
doaj   +1 more source

Статический анализ кода мобильных приложений как средство выявления его уязвимостей [PDF]

open access: yes, 2015
В статье рассмотрен статический анализ исходного кода программ для мобильных платформ как одно из средств обеспечения безопасности мобильных систем. Проанализированы различные сценарии практического применения такого рода анализатора в качестве средства ...
Цыганенко, Никита Павлович
core  

PROGESI: A PROxy Grammar to Enhance Web Application Firewall for SQL Injection Prevention

open access: yesIEEE Access
A web application is prone to security threats due to its open nature. The security of these platforms is imperative for organizations of all sizes because they store sensitive information.
Anthony J. Coscia   +4 more
semanticscholar   +1 more source

Developing an Accounting Virtual Assistant Through Supervised Fine‐Tuning (SFT) of a Small Language Model (SLM)

open access: yesIntelligent Systems in Accounting, Finance and Management, Volume 32, Issue 3, September 2025.
ABSTRACT The development of an in‐house accounting bot—an artificial intelligence (AI) assistant capable of generating internally structured bookkeeping double‐entry posting schemes—is explored in this paper. The processes of curating a suitable dataset, selecting, and fine‐tuning a seven‐billion‐parameter language model, categorized as a small ...
Mario Zupan
wiley   +1 more source

SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]

open access: yes, 2018
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core   +1 more source

Home - About - Disclaimer - Privacy