Results 61 to 70 of about 980 (175)

Algorithms and software solutions for SQL injection vulnerability testing in web applications

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, 2018
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk   +3 more
doaj   +1 more source

Automated vulnerability evaluation with large language models and vulnerability ontologies

open access: yesAI Magazine, Volume 46, Issue 3, Fall 2025.
Abstract The National Vulnerability Database (NVD) publishes over a thousand new vulnerabilities monthly, with a projected 25 percent increase in 2024, highlighting the crucial need for rapid vulnerability identification to mitigate cybersecurity attacks and save costs and resources.
Rikhiya Ghosh   +5 more
wiley   +1 more source

Developing an Accounting Virtual Assistant Through Supervised Fine‐Tuning (SFT) of a Small Language Model (SLM)

open access: yesIntelligent Systems in Accounting, Finance and Management, Volume 32, Issue 3, September 2025.
ABSTRACT The development of an in‐house accounting bot—an artificial intelligence (AI) assistant capable of generating internally structured bookkeeping double‐entry posting schemes—is explored in this paper. The processes of curating a suitable dataset, selecting, and fine‐tuning a seven‐billion‐parameter language model, categorized as a small ...
Mario Zupan
wiley   +1 more source

Implementasi Penetration Testing Pada Sistem Informasi Terpadu Layanan Prodi Menggunakan Framework Issaf [PDF]

open access: yesTechno
Keamanan sistem informasi menjadi aspek kritis dalam lingkungan teknologi informasi yang terus berkembang. Penetration testing adalah salah satu metode yang efektif untuk mengidentifikasi dan menguji keamanan dalam sebuah simulasi serangan terhadap suatu
Anisa Sholawati   +2 more
doaj   +1 more source

Tempus: An Evolutionary Mutation Testing System on Event‐Based Systems With Profile‐Based Individual Generation

open access: yesSoftware Testing, Verification and Reliability, Volume 35, Issue 5, August 2025.
Tempus is a testing system that enhances Evolutionary Mutation Testing (EMT) by using ProfileBased individual generation (PBig). PBig generates new individuals based on previous knowledge from other programs about which operators are more likely to produce strong mutants.
Lorena Gutiérrez‐Madroñal   +2 more
wiley   +1 more source

How Can Cryptography Secure Online Assessments Against Academic Dishonesty?

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 4, July/August 2025.
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi   +2 more
wiley   +1 more source

Devising Solution to SQL Injection Attacks

open access: yesInternational Journal of Computer Applications, 2016
Web application plays an important role in different fields like finance sector, business, shopping etc. There is no. of web application vulnerabilities such as SQL injection, Buffer overflow etc. Above these SQL Injection vulnerabilities are very harmful for web applications.
Shivam Choudhary   +2 more
openaire   +1 more source

Discovery and research of network security vulnerabilities based on Web application

open access: yes网络与信息安全学报, 2016
Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS ...
Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU
doaj   +3 more sources

IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks

open access: yesThe Journal of Engineering
The Internet of Things (IoT) technology is everywhere; they are making things more intelligent and connected, from smart cities to transport systems to homes, especially in the healthcare industry. This paper focuses on IoT in the healthcare domain.
Mohammed Mohammed Raoof   +2 more
doaj   +1 more source

The Importance of Developing Preventive Techniques for SQL Injection Attacks

open access: yesTehnički Glasnik, 2022
Many intentionally vulnerable web applications are circulating on the Internet that serve as a legal test ground for practicing SQL injection attacks. For demonstration purposes the attacks will target an Acunetix test web application created using PHP ...
Nenad Bedeković   +3 more
doaj  

Home - About - Disclaimer - Privacy