Results 131 to 140 of about 980 (175)
An attack detection method based on deep learning for internet of things. [PDF]
Yu Y, Fu Y, Liu T, Wang K, An Y.
europepmc +1 more source
A novel deep learning framework with temporal attention convolutional networks for intrusion detection in IoT and IIoT networks. [PDF]
Ghosh KP +4 more
europepmc +1 more source
Advancements in cyberthreat intelligence through resource exhaustion attack detection using hybrid deep learning with heuristic search algorithms. [PDF]
Jayanthi S +6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Advances in Engineering Innovation, 2023
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire +1 more source
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire +1 more source
SQL-Identifier Injection Attacks
2019 IEEE Conference on Communications and Network Security (CNS), 2019This paper defines a class of SQL-injection attacks that are based on injecting identifiers, such as table and column names, into SQL statements. An automated analysis of GitHub shows that 15.7% of 120,412 posted Java source files contain code vulnerable to SQL-Identifier Injection Attacks (SQL-IDIAs).
Cagri Cetin, Dmitry Goldgof, Jay Ligatti
openaire +1 more source
SQL Injection Attacks Countermeasures
2012Due to the huge growth in the need for using Web applications worldwide, there have been huge efforts from programmers to develop and implement new Web applications to be used by companies. Since a number of these applications lack proper security considerations, malicious users will be able to gain unauthorized access to confidential information of ...
Kasra Amirtahmasebi +1 more
openaire +1 more source
Review on SQL injection and prevention methods (SQL Injection Attacks)
SSRN Electronic Journal, 2008Today, the spread of the use of the Internet has led to the growth of explosive web design. Millions of users worldwide perform many of their important and vital activities through these websites and in the world of the Internet. This has turned the world of the Internet into a vast repository of information, information that is often important and ...
openaire +2 more sources
On Preventing SQL Injection Attacks
2015In this paper, we propose three new approaches to detect and prevent SQL Injection Attacks (SQLIA), as an alternative to the existing solutions namely: (i) Query Rewriting-based approach, (ii) Encoding-based approach, and (iii) Assertion-based approach. We discuss in detail the benefits and shortcomings of the proposals w.r.t. the literature.
Bharat Kumar Ahuja +3 more
openaire +1 more source
Testing Snort with SQL Injection Attacks
Proceedings of the Ninth International C* Conference on Computer Science & Software Engineering - C3S2E '16, 2016Currently, information security is a significant challenge in the information era because businesses store critical information in databases. Therefore, databases need to be a secure component of an enterprise. Organizations use Intrusion Detection Systems (IDS) as a security infrastructure component, of which a popular implementation is Snort. In this
Rui Silva +2 more
openaire +1 more source
SQL injection attacks - a systematic review
International Journal of Information and Computer Security, 2019In today's era, each and every person is utilising websites and so many different web applications for online administrations, for example: booking of railway tickets, movie ticketing, shopping, communication and so forth. These websites consists sensitive and confidential information.
Kirti Sharma, Shobha Bhatt
openaire +1 more source

