Results 61 to 70 of about 10,242 (187)
An optimized attack tree model for security test case planning and generation [PDF]
Securing software assets via efficient test case management is an important task in order to realize business goals. Given the huge risks web applications face due to incessant cyberattacks, a proactive risk strategy such as threat modeling is adopted ...
Ahmed, Maryam +2 more
core
Tempus is a testing system that enhances Evolutionary Mutation Testing (EMT) by using ProfileBased individual generation (PBig). PBig generates new individuals based on previous knowledge from other programs about which operators are more likely to produce strong mutants.
Lorena Gutiérrez‐Madroñal +2 more
wiley +1 more source
Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified.
Bahman Arasteh +3 more
doaj +1 more source
Injection, Detection, Prevention of SQL Injection Attacks
SQL injections have been always the top most priority for any website and web application. Every web application and website developed in php, asp.net, jsp which is connected to the database like MySQL, Microsoft SQL Server, and oracle are prone to SQL injection attacks. Most of the websites are created by using open source language such as php.
Pratik Adhikari, Abhay K.Kolhe
openaire +1 more source
Textual Manipulation for SQL Injection Attacks [PDF]
Abstrac—SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed.
Hussein AlNabulsi +2 more
openaire +1 more source
SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core +1 more source
Preventing SQL Injection through Automatic Query Sanitization with ASSIST
Web applications are becoming an essential part of our everyday lives. Many of our activities are dependent on the functionality and security of these applications. As the scale of these applications grows, injection vulnerabilities such as SQL injection
Gwen Salaün +4 more
core +2 more sources
How Can Cryptography Secure Online Assessments Against Academic Dishonesty?
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi +2 more
wiley +1 more source
Reaction to New Security Threat Class [PDF]
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core
A Framework for Evaluation of SQL Injection Detection and Prevention Tools
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj

