Results 81 to 90 of about 22,704 (203)

A Deep Learning Approach Using Optimized LSTM for Anomaly‐Based Network Intrusion Detection

open access: yesJournal of Engineering, Volume 2026, Issue 1, 2026.
With the exponential rise in cyber threats, anomaly‐based network intrusion detection systems (NIDSs) have become critical for maintaining robust cybersecurity. This article proposes an optimized long short‐term memory (LSTM) deep learning (DL) model specifically designed to detect anomalies in network traffic.
Samia Dardouri, Shikha Binwal
wiley   +1 more source

Application of Artificial Intelligence in Detecting SQL Injection Attacks

open access: yesJOIV: International Journal on Informatics Visualization
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped.
Nwabudike Augustine   +3 more
doaj   +1 more source

Preventing SQL Injection Attacks

open access: yesInternational Journal of Computer Applications, 2012
With the recent rapid increase in web based applications that employ back-end database services, results show that SQL Injection and Remote File Inclusion are the two frequently used exploits rather than using other complicated techniques. With the rise in use of web applications, SQL injection based attacks are gradually increasing and is now one of ...
Vaidhyanathan.G Vaidhyanathan.G   +2 more
openaire   +1 more source

Measurement of a microwave field amplitude beyond the standard quantum limit

open access: yes, 2016
We report a quantum measurement beyond the standard quantum limit (SQL) for the amplitude of a small displacement acting on a cavity field. This measurement uses as resource an entangled mesoscopic state, prepared by the resonant interaction of a ...
Brune, M.   +8 more
core   +3 more sources

A Framework for Evaluation of SQL Injection Detection and Prevention Tools

open access: yesInternational Journal of Information and Communication Technology Research, 2013
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj  

Algorithms and software solutions for SQL injection vulnerability testing in web applications

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, 2018
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk   +3 more
doaj   +1 more source

Статический анализ кода мобильных приложений как средство выявления его уязвимостей [PDF]

open access: yes, 2015
В статье рассмотрен статический анализ исходного кода программ для мобильных платформ как одно из средств обеспечения безопасности мобильных систем. Проанализированы различные сценарии практического применения такого рода анализатора в качестве средства ...
Цыганенко, Никита Павлович
core  

SQL Injection Detection Based on Lightweight Multi-Head Self-Attention

open access: yesApplied Sciences
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo   +2 more
doaj   +1 more source

The AEI 10 m prototype interferometer [PDF]

open access: yes, 2010
A 10 m prototype interferometer facility is currently being set up at the AEI in Hannover, Germany. The prototype interferometer will be housed inside a 100 m^3 ultra-high vacuum envelope. Seismically isolated optical tables inside the vacuum system will
Chen, Yanbei, Goßler, S., Somiya, K.
core  

Approach to detecting SQL injection behaviors in network environment

open access: yesTongxin xuebao, 2016
SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers.
Yu-fei ZHAO   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy