Results 81 to 90 of about 22,704 (203)
A Deep Learning Approach Using Optimized LSTM for Anomaly‐Based Network Intrusion Detection
With the exponential rise in cyber threats, anomaly‐based network intrusion detection systems (NIDSs) have become critical for maintaining robust cybersecurity. This article proposes an optimized long short‐term memory (LSTM) deep learning (DL) model specifically designed to detect anomalies in network traffic.
Samia Dardouri, Shikha Binwal
wiley +1 more source
Application of Artificial Intelligence in Detecting SQL Injection Attacks
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped.
Nwabudike Augustine +3 more
doaj +1 more source
Preventing SQL Injection Attacks
With the recent rapid increase in web based applications that employ back-end database services, results show that SQL Injection and Remote File Inclusion are the two frequently used exploits rather than using other complicated techniques. With the rise in use of web applications, SQL injection based attacks are gradually increasing and is now one of ...
Vaidhyanathan.G Vaidhyanathan.G +2 more
openaire +1 more source
Measurement of a microwave field amplitude beyond the standard quantum limit
We report a quantum measurement beyond the standard quantum limit (SQL) for the amplitude of a small displacement acting on a cavity field. This measurement uses as resource an entangled mesoscopic state, prepared by the resonant interaction of a ...
Brune, M. +8 more
core +3 more sources
A Framework for Evaluation of SQL Injection Detection and Prevention Tools
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj
Algorithms and software solutions for SQL injection vulnerability testing in web applications
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk +3 more
doaj +1 more source
Статический анализ кода мобильных приложений как средство выявления его уязвимостей [PDF]
В статье рассмотрен статический анализ исходного кода программ для мобильных платформ как одно из средств обеспечения безопасности мобильных систем. Проанализированы различные сценарии практического применения такого рода анализатора в качестве средства ...
Цыганенко, Никита Павлович
core
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo +2 more
doaj +1 more source
The AEI 10 m prototype interferometer [PDF]
A 10 m prototype interferometer facility is currently being set up at the AEI in Hannover, Germany. The prototype interferometer will be housed inside a 100 m^3 ultra-high vacuum envelope. Seismically isolated optical tables inside the vacuum system will
Chen, Yanbei, Goßler, S., Somiya, K.
core
Approach to detecting SQL injection behaviors in network environment
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers.
Yu-fei ZHAO +3 more
doaj +2 more sources

