Results 91 to 100 of about 10,242 (187)

ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks [PDF]

open access: yes, 2019
Despite the fact that cyberattacks are constantly growing in complexity, the research community still lacks effective tools to easily monitor and understand them.
Shen, Yun, Stringhini, Gianluca
core  

Application of Artificial Intelligence in Detecting SQL Injection Attacks

open access: yesJOIV: International Journal on Informatics Visualization
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped.
Nwabudike Augustine   +3 more
doaj   +1 more source

Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level

open access: yes, 2017
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core  

Dual Stage SQL Injection Attacks

open access: yes, 2009
I came across quite an interesting SQL Injection scenario today. The software in which the vulnerability resides will remain anonymous until fixed, but an abstracted version of the scenario can safely be outlined below. The objective of the software is to restrict user accounts to certain IP addresses when accessing a bulletin board.
openaire   +2 more sources

Detection of the Security Vulnerabilities in Web Applications [PDF]

open access: yes
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect.
Marius POPA
core  

Redesigning More Resilent Sahana System For Disaster Information In Indonesia [PDF]

open access: yes, 2011
This application is a disaster information system in Indonesia using Sahana platform that has many unique features of the integration Sahana disaster with some applications that have been built independently in the previous year of mudflow in Sidoarjo ...
Arna, Fariza   +4 more
core  

Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection

open access: yesIET Information Security
In the past decade, cybersecurity has become increasingly significant, driven largely by the increase in cybersecurity threats. Among these threats, SQL injection attacks stand out as a particularly common method of cyber attack.
Yixian Liu, Yupeng Dai
doaj   +1 more source

Security Performance Analysis of Photography Service System

open access: yesJournal of Computing Research and Innovation, 2019
Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers.
Nur Khairani Kamarudin   +4 more
doaj   +1 more source

A Hybrid Deep Learning Model for SQL Injection Attack Detection

open access: yesIEEE Access
An increasing number of web application services raises significant security concerns. Online access to these applications exposes them to multiple cyberattacks.
Emanuel N. Casmiry   +2 more
doaj   +1 more source

Abstract

open access: yes
JPGN Reports, Volume 6, Issue S2, Page S1-S814, September 2025.
wiley   +1 more source

Home - About - Disclaimer - Privacy