Results 101 to 110 of about 10,242 (187)
Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions [PDF]
Phishing has grown significantly in volume over the time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in number of attempts to cheat internet users, both businesses and private ones ...
Alexandru TABUSCA, Ion LUNGU
core
INFO2009 - Team 'DROP TABLE groups; [PDF]
Edshare for INFO2009 coursework 2 - Team 'DROP TABLE ...
Bull, Samuel +5 more
core
Secure Scrum: Development of Secure Software with Scrum
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
core
Detecting and Defeating SQL Injection Attacks
Abstract —The increasing dependence on web applications have made them a natural target for attackers. Among these attacks SQL Injection Attacks (SQLIA) are the most prevalent. In this paper we propose a SQL injection vulnerability scanner that is light-weight, fast and has a low false positive rate. These scanners prove as a practical tool to discover
openaire +1 more source
openaire +1 more source
Proposed Methods To Prevent SQL Injection
In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted ...
A. H. Mohmmed
doaj
Enhanced SQL injection detection using chi-square feature selection and machine learning classifiers. [PDF]
Casmiry E, Mduma N, Sinde R.
europepmc +1 more source
Web application firewall based on machine learning models. [PDF]
Durmuşkaya ME, Bayraklı S.
europepmc +1 more source

