Results 81 to 90 of about 23,094 (187)

The AEI 10 m prototype interferometer [PDF]

open access: yes, 2010
A 10 m prototype interferometer facility is currently being set up at the AEI in Hannover, Germany. The prototype interferometer will be housed inside a 100 m^3 ultra-high vacuum envelope. Seismically isolated optical tables inside the vacuum system will
Chen, Yanbei, Goßler, S., Somiya, K.
core  

SQL Injection Detection Based on Lightweight Multi-Head Self-Attention

open access: yesApplied Sciences
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo   +2 more
doaj   +1 more source

Approach to detecting SQL injection behaviors in network environment

open access: yesTongxin xuebao, 2016
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers.
Yu-fei ZHAO   +3 more
doaj   +2 more sources

Using Links to prototype a Database Wiki [PDF]

open access: yes, 2011
Both relational databases and wikis have strengths that make them attractive for use in collaborative applications. In the last decade, database-backed Web applications have been used extensively to develop valuable shared biological references called ...
Cheney, James   +2 more
core   +1 more source

Menangkal Serangan SQL Injection Dengan Parameterized Query

open access: yesJEPIN (Jurnal Edukasi dan Penelitian Informatika), 2016
Semakin meningkat pertumbuhan layanan informasi maka semakin tinggi pula tingkat kerentanan keamanan dari suatu sumber informasi. Melalui tulisan ini disajikan penelitian yang dilakukan secara eksperimen yang membahas tentang kejahatan penyerangan ...
Yulianingsih Yulianingsih
doaj   +1 more source

SQL Injection Test (D3)

open access: green, 2021
Ignacio Crespo, Adrián Campazas
openalex   +2 more sources

Analisis Forensik Jaringan Studi Kasus Serangan SQL Injection pada Server Universitas Gadjah Mada

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2013
Abstrak Forensik jaringan merupakan ilmu keamanan komputer berkaitan dengan investigasi untuk menemukan sumber serangan pada jaringan berdasarkan bukti log, mengidentifikasi, menganalisis serta merekonstruksi ulang kejadian tersebut. Penelitian forensik
Resi Utami Putri, Jazi Eko Istiyanto
doaj   +1 more source

Critical issue to consider while developing SQL injection prevention mechanism [PDF]

open access: yes, 2015
SQL injection vulnerability is the one of the most common web-based application vulnerabilities that can be exploited by SQL injection attack to gain access to restricted data, bypass authentication mechanism and execute unauthorized data manipulation ...
Aliero, Muhammad Saidu   +3 more
core  

AN ENHANCED SQL INJECTION DETECTION USING ENSEMBLE METHOD

open access: diamond, 2023
Doni Putra Purbawa   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy