Results 91 to 100 of about 10,242 (187)
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks [PDF]
Despite the fact that cyberattacks are constantly growing in complexity, the research community still lacks effective tools to easily monitor and understand them.
Shen, Yun, Stringhini, Gianluca
core
Application of Artificial Intelligence in Detecting SQL Injection Attacks
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped.
Nwabudike Augustine +3 more
doaj +1 more source
Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core
Dual Stage SQL Injection Attacks
I came across quite an interesting SQL Injection scenario today. The software in which the vulnerability resides will remain anonymous until fixed, but an abstracted version of the scenario can safely be outlined below. The objective of the software is to restrict user accounts to certain IP addresses when accessing a bulletin board.
openaire +2 more sources
Detection of the Security Vulnerabilities in Web Applications [PDF]
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect.
Marius POPA
core
Redesigning More Resilent Sahana System For Disaster Information In Indonesia [PDF]
This application is a disaster information system in Indonesia using Sahana platform that has many unique features of the integration Sahana disaster with some applications that have been built independently in the previous year of mudflow in Sidoarjo ...
Arna, Fariza +4 more
core
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
In the past decade, cybersecurity has become increasingly significant, driven largely by the increase in cybersecurity threats. Among these threats, SQL injection attacks stand out as a particularly common method of cyber attack.
Yixian Liu, Yupeng Dai
doaj +1 more source
Security Performance Analysis of Photography Service System
Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers.
Nur Khairani Kamarudin +4 more
doaj +1 more source
A Hybrid Deep Learning Model for SQL Injection Attack Detection
An increasing number of web application services raises significant security concerns. Online access to these applications exposes them to multiple cyberattacks.
Emanuel N. Casmiry +2 more
doaj +1 more source

