Results 41 to 50 of about 10,242 (187)

Deep Learning-Based Detection Technology for SQL Injection Research and Implementation

open access: yesApplied Sciences, 2023
Amid the incessant evolution of the Internet, an array of cybersecurity threats has surged at an unprecedented rate. A notable antagonist within this plethora of attacks is the SQL injection assault, a prevalent form of Internet attack that poses a ...
Hao Sun, Yuejin Du, Qi Li
doaj   +1 more source

Analysis of SQL Injection Attack

open access: yesInternational Journal of Computer Science and Informatics, 2013
SQL injection attacks are a serious security threat to Web applications. They allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitive information these database contain. Various researchers and practitioners have proposed various methods to address the SQL injection problem. To address
Jayeeta Majumder, Gargi Saha
openaire   +1 more source

SQL Injection - Database Attack Revolution and Prevention [PDF]

open access: yes, 2011
SQL injection came with a bang and caused revolution in database attacking. In recent years, with the explosion in web-based commerce and information systems, databases have been drawing ever closer to the network and it is critical part of network ...
Dorai, R. (Ramakanth)   +1 more
core  

Annual Weather Patterns Drive Large Pulses of Saline Submarine Groundwater Discharge and Major Summer Inputs of Nutrients to the South Atlantic Bight

open access: yesJournal of Geophysical Research: Oceans, Volume 131, Issue 1, January 2026.
Abstract Submarine groundwater discharge (SGD) is a significant source of nutrients to continental shelf waters. Increasing evidence suggests that most of this flow is saline (∼seawater salinity) and occurs across broad continental shelves, making it challenging to observe.
Jacob Vincent   +7 more
wiley   +1 more source

Proposed Method to Prevent SQL Injection Attack

open access: yesIraqi Journal for Computers and Informatics, 2016
the internet and its websites have huge using these days. These webs may have sensitive and secret information like military information, financial information and other important information that transfer through the networks.
Makera Aziz, Dena Ahmed
doaj   +1 more source

A Comprehensive Survey on LLM‐Based Network Management and Operations

open access: yesInternational Journal of Network Management, Volume 35, Issue 6, November/December 2025.
ABSTRACT The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule‐based methods, adopting advanced artificial intelligence (AI)‐driven
Jibum Hong   +2 more
wiley   +1 more source

Using Flask for SQLIA Detection and Protection

open access: yesTikrit Journal of Engineering Sciences, 2020
At present the web applications are used for most of the life activities, these applications are affected by an attack called (Structure Query Language Injection Attack) SQLIA due to the vulnerabilities of the web application.
Ann Z. Ablahd, Suhair A. Dawwod
doaj   +3 more sources

SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN

open access: yesIEEE Access, 2019
An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security Project (OWASP).
Xin Xie   +4 more
doaj   +1 more source

Analisis Celah Keamanan dan Mitigasi Website E-learning Itera Menggunakan Owasp Zed Attack Proxy

open access: yesDinamika Rekayasa, 2023
Website kuliah atau E-Learning ITERA merupakan sistem yang mewadahi proses belajar mengajar antara dosen dan mahasiswa. Keamanan informasi dari sistem ini sangat penting mengingat banyaknya data terkait nilai ataupun materi perkuliahan yang ada pada ...
Ilham Firman Ashari   +3 more
doaj   +1 more source

SQL Injection in Oracle: An Exploration of Vulnerabilities [PDF]

open access: yes, 2012
Structured Query Language (SQL) injection is one of the most devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL Injection can compromise usernames, passwords,
Ansari, Sid, Sykes, Edward R.
core  

Home - About - Disclaimer - Privacy