Results 81 to 90 of about 23,094 (187)
The AEI 10 m prototype interferometer [PDF]
A 10 m prototype interferometer facility is currently being set up at the AEI in Hannover, Germany. The prototype interferometer will be housed inside a 100 m^3 ultra-high vacuum envelope. Seismically isolated optical tables inside the vacuum system will
Chen, Yanbei, Goßler, S., Somiya, K.
core
Ensemble Machine Learning Approaches for Detection of SQL Injection Attack
Umar Farooq
openalex +2 more sources
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo +2 more
doaj +1 more source
Approach to detecting SQL injection behaviors in network environment
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers.
Yu-fei ZHAO +3 more
doaj +2 more sources
Using Links to prototype a Database Wiki [PDF]
Both relational databases and wikis have strengths that make them attractive for use in collaborative applications. In the last decade, database-backed Web applications have been used extensively to develop valuable shared biological references called ...
Cheney, James +2 more
core +1 more source
Menangkal Serangan SQL Injection Dengan Parameterized Query
Semakin meningkat pertumbuhan layanan informasi maka semakin tinggi pula tingkat kerentanan keamanan dari suatu sumber informasi. Melalui tulisan ini disajikan penelitian yang dilakukan secara eksperimen yang membahas tentang kejahatan penyerangan ...
Yulianingsih Yulianingsih
doaj +1 more source
Analisis Forensik Jaringan Studi Kasus Serangan SQL Injection pada Server Universitas Gadjah Mada
Abstrak Forensik jaringan merupakan ilmu keamanan komputer berkaitan dengan investigasi untuk menemukan sumber serangan pada jaringan berdasarkan bukti log, mengidentifikasi, menganalisis serta merekonstruksi ulang kejadian tersebut. Penelitian forensik
Resi Utami Putri, Jazi Eko Istiyanto
doaj +1 more source
Critical issue to consider while developing SQL injection prevention mechanism [PDF]
SQL injection vulnerability is the one of the most common web-based application vulnerabilities that can be exploited by SQL injection attack to gain access to restricted data, bypass authentication mechanism and execute unauthorized data manipulation ...
Aliero, Muhammad Saidu +3 more
core
AN ENHANCED SQL INJECTION DETECTION USING ENSEMBLE METHOD
Doni Putra Purbawa +3 more
openalex +1 more source

