Results 81 to 90 of about 23,541 (235)

A Wireless Cortical Surface Implant for Diagnosing and Alleviating Parkinson's Disease Symptoms in Freely Moving Animals

open access: yesAdvanced Healthcare Materials, Volume 14, Issue 17, July 4, 2025.
A wireless cortical surface implant employing graphene electrode arrays diagnoses and alleviates Parkinson's disease symptoms in freely moving animals. The device continuously monitors cortical activity and delivers targeted stimulation, restoring beta–gamma and delta oscillations.
Hongseong Shin   +15 more
wiley   +1 more source

CODDLE: Code-Injection Detection With Deep Learning

open access: yesIEEE Access, 2019
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj   +1 more source

SQL Injection - Database Attack Revolution and Prevention [PDF]

open access: yes, 2011
SQL injection came with a bang and caused revolution in database attacking. In recent years, with the explosion in web-based commerce and information systems, databases have been drawing ever closer to the network and it is critical part of network ...
Dorai, R. (Ramakanth)   +1 more
core  

Establishment of a Protocol for CE‐MS Based Peptidome Analysis of Human Saliva

open access: yesPROTEOMICS, Volume 25, Issue 13, July 2025.
ABSTRACT Proteins and peptides indicate physiological or pathological states and are investigated to identify markers to scrutinize health and disease surveillance. Saliva contains many proteins and peptides that could serve as biomarkers, offering a potential noninvasive approach for disease detection.
Carl‐Johan Törnhage   +6 more
wiley   +1 more source

Models and scenarios of implementation of threats for internet resources

open access: yesРоссийский технологический журнал, 2020
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj   +1 more source

Application of Artificial Intelligence in Detecting SQL Injection Attacks

open access: yesJOIV: International Journal on Informatics Visualization
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped.
Nwabudike Augustine   +3 more
doaj   +1 more source

Algorithms and software solutions for SQL injection vulnerability testing in web applications

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, 2018
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk   +3 more
doaj   +1 more source

Analisa Keamanan Web Server terhadap Serangan Possibility Sql Injection Studi Kasus: Web Server Umk [PDF]

open access: yes, 2015
Keamanan merupakan salah satu faktor penting yang harus diperhatikan dalam membangun sebuah website. Hal tersebut menjadi sebuah tantangan tersendiri bagi para pengembang website, karena tidak ada jaminan yang pasti akan defenisi aman itu sendiri.
Dahlan, M. (Moh)   +2 more
core   +1 more source

A Framework for Evaluation of SQL Injection Detection and Prevention Tools

open access: yesInternational Journal of Information and Communication Technology Research, 2013
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj  

Injection, Detection, Prevention of SQL Injection Attacks

open access: yesInternational Journal of Computer Applications, 2014
SQL injections have been always the top most priority for any website and web application. Every web application and website developed in php, asp.net, jsp which is connected to the database like MySQL, Microsoft SQL Server, and oracle are prone to SQL injection attacks. Most of the websites are created by using open source language such as php.
Pratik Adhikari, Abhay K.Kolhe
openaire   +1 more source

Home - About - Disclaimer - Privacy