Results 101 to 110 of about 10,242 (187)

Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions [PDF]

open access: yes
Phishing has grown significantly in volume over the time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in number of attempts to cheat internet users, both businesses and private ones ...
Alexandru TABUSCA, Ion LUNGU
core  

Poster Sessions

open access: yes
HemaSphere, Volume 9, Issue S1, June 2025.
wiley   +1 more source

Publication Only

open access: yes
HemaSphere, Volume 9, Issue S1, June 2025.
wiley   +1 more source

INFO2009 - Team 'DROP TABLE groups; [PDF]

open access: yes
Edshare for INFO2009 coursework 2 - Team 'DROP TABLE ...
Bull, Samuel   +5 more
core  

Secure Scrum: Development of Secure Software with Scrum

open access: yes, 2015
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
core  

Detecting and Defeating SQL Injection Attacks

open access: yesInternational Journal of Information and Electronics Engineering, 2011
Abstract —The increasing dependence on web applications have made them a natural target for attackers. Among these attacks SQL Injection Attacks (SQLIA) are the most prevalent. In this paper we propose a SQL injection vulnerability scanner that is light-weight, fast and has a low false positive rate. These scanners prove as a practical tool to discover
openaire   +1 more source

DISCUSS SQL INJECTION ATTACKS

open access: yesInternational Research Journal of Modernization in Engineering Technology and Science, 2023
openaire   +1 more source

Proposed Methods To Prevent SQL Injection

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted ...
A. H. Mohmmed
doaj  

Home - About - Disclaimer - Privacy