Results 81 to 90 of about 23,541 (235)
A wireless cortical surface implant employing graphene electrode arrays diagnoses and alleviates Parkinson's disease symptoms in freely moving animals. The device continuously monitors cortical activity and delivers targeted stimulation, restoring beta–gamma and delta oscillations.
Hongseong Shin +15 more
wiley +1 more source
CODDLE: Code-Injection Detection With Deep Learning
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj +1 more source
SQL Injection - Database Attack Revolution and Prevention [PDF]
SQL injection came with a bang and caused revolution in database attacking. In recent years, with the explosion in web-based commerce and information systems, databases have been drawing ever closer to the network and it is critical part of network ...
Dorai, R. (Ramakanth) +1 more
core
Establishment of a Protocol for CE‐MS Based Peptidome Analysis of Human Saliva
ABSTRACT Proteins and peptides indicate physiological or pathological states and are investigated to identify markers to scrutinize health and disease surveillance. Saliva contains many proteins and peptides that could serve as biomarkers, offering a potential noninvasive approach for disease detection.
Carl‐Johan Törnhage +6 more
wiley +1 more source
Models and scenarios of implementation of threats for internet resources
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj +1 more source
Application of Artificial Intelligence in Detecting SQL Injection Attacks
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped.
Nwabudike Augustine +3 more
doaj +1 more source
Algorithms and software solutions for SQL injection vulnerability testing in web applications
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk +3 more
doaj +1 more source
Analisa Keamanan Web Server terhadap Serangan Possibility Sql Injection Studi Kasus: Web Server Umk [PDF]
Keamanan merupakan salah satu faktor penting yang harus diperhatikan dalam membangun sebuah website. Hal tersebut menjadi sebuah tantangan tersendiri bagi para pengembang website, karena tidak ada jaminan yang pasti akan defenisi aman itu sendiri.
Dahlan, M. (Moh) +2 more
core +1 more source
A Framework for Evaluation of SQL Injection Detection and Prevention Tools
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj
Injection, Detection, Prevention of SQL Injection Attacks
SQL injections have been always the top most priority for any website and web application. Every web application and website developed in php, asp.net, jsp which is connected to the database like MySQL, Microsoft SQL Server, and oracle are prone to SQL injection attacks. Most of the websites are created by using open source language such as php.
Pratik Adhikari, Abhay K.Kolhe
openaire +1 more source

