A Modular Dynamic Probabilistic Risk Assessment Framework for Electric Grid Cybersecurity
This paper presents a modular framework designed for dynamic probabilistic risk assessment of electric grid systems facing cybersecurity threats. The functionality and efficacy of the framework have been demonstrated using an IEEE 14‐bus system in a case study.
Xiaoxu Diao +6 more
wiley +1 more source
Blind SQL Injection Attacks Optimization
This paper presents new and evolved methods to perform Blind SQL Injection attacks. These are much faster than the current publicly available tools and techniques due to optimization and redesign ideas that hack databases in more efficient methods, using cleverer injection payloads; this is the result of years of private research.
openaire +1 more source
Critical issue to consider while developing SQL injection prevention mechanism [PDF]
SQL injection vulnerability is the one of the most common web-based application vulnerabilities that can be exploited by SQL injection attack to gain access to restricted data, bypass authentication mechanism and execute unauthorized data manipulation ...
Aliero, Muhammad Saidu +3 more
core
Automated vulnerability evaluation with large language models and vulnerability ontologies
Abstract The National Vulnerability Database (NVD) publishes over a thousand new vulnerabilities monthly, with a projected 25 percent increase in 2024, highlighting the crucial need for rapid vulnerability identification to mitigate cybersecurity attacks and save costs and resources.
Rikhiya Ghosh +5 more
wiley +1 more source
GMSA: Gathering Multiple Signatures Approach to Defend Against Code Injection Attacks
Code injection attacks (CIAs) exploit security vulnerabilities and computer bugs that are caused by processing invalid codes. CIA is a problem which hackers attempt to introduce to any new method, their objective being to bypass the protection system. In
Hussein Alnabulsi +2 more
doaj +1 more source
ABSTRACT The development of an in‐house accounting bot—an artificial intelligence (AI) assistant capable of generating internally structured bookkeeping double‐entry posting schemes—is explored in this paper. The processes of curating a suitable dataset, selecting, and fine‐tuning a seven‐billion‐parameter language model, categorized as a small ...
Mario Zupan
wiley +1 more source
HYBRID INTRUSION DETECTION SYSTEM USING FUZZY LOGIC INFERENCE ENGINE FOR SQL INJECTION ATTACK
SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (
Rajif Agung Yunmar
doaj +1 more source
Perancangan Keamanan Sistem Menggunakan Algoritma Honeypot pada Aplikasi Krs Online (Studi Kasus : Sekolah Tinggi Teknologi Adisutjipto) [PDF]
Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force.
Sajati, H. (Haruno) +2 more
core
Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand,
Fahad M. Alotaibi +1 more
doaj +1 more source
Framework of SQL Injection Attack
With the changing demographics of globalization, the emergence and prevalence of web application have acquired a central and pivotal role in the domains of technology and advancements. It thus becomes imperative to probe deeply into the architecture, significance and different facets of usages.
Patwari, Neha, Bhurani, Parvati
openaire +2 more sources

