Results 61 to 70 of about 980 (175)
Algorithms and software solutions for SQL injection vulnerability testing in web applications
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk +3 more
doaj +1 more source
Automated vulnerability evaluation with large language models and vulnerability ontologies
Abstract The National Vulnerability Database (NVD) publishes over a thousand new vulnerabilities monthly, with a projected 25 percent increase in 2024, highlighting the crucial need for rapid vulnerability identification to mitigate cybersecurity attacks and save costs and resources.
Rikhiya Ghosh +5 more
wiley +1 more source
ABSTRACT The development of an in‐house accounting bot—an artificial intelligence (AI) assistant capable of generating internally structured bookkeeping double‐entry posting schemes—is explored in this paper. The processes of curating a suitable dataset, selecting, and fine‐tuning a seven‐billion‐parameter language model, categorized as a small ...
Mario Zupan
wiley +1 more source
Implementasi Penetration Testing Pada Sistem Informasi Terpadu Layanan Prodi Menggunakan Framework Issaf [PDF]
Keamanan sistem informasi menjadi aspek kritis dalam lingkungan teknologi informasi yang terus berkembang. Penetration testing adalah salah satu metode yang efektif untuk mengidentifikasi dan menguji keamanan dalam sebuah simulasi serangan terhadap suatu
Anisa Sholawati +2 more
doaj +1 more source
Tempus is a testing system that enhances Evolutionary Mutation Testing (EMT) by using ProfileBased individual generation (PBig). PBig generates new individuals based on previous knowledge from other programs about which operators are more likely to produce strong mutants.
Lorena Gutiérrez‐Madroñal +2 more
wiley +1 more source
How Can Cryptography Secure Online Assessments Against Academic Dishonesty?
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi +2 more
wiley +1 more source
Devising Solution to SQL Injection Attacks
Web application plays an important role in different fields like finance sector, business, shopping etc. There is no. of web application vulnerabilities such as SQL injection, Buffer overflow etc. Above these SQL Injection vulnerabilities are very harmful for web applications.
Shivam Choudhary +2 more
openaire +1 more source
Discovery and research of network security vulnerabilities based on Web application
Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS ...
Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU
doaj +3 more sources
IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks
The Internet of Things (IoT) technology is everywhere; they are making things more intelligent and connected, from smart cities to transport systems to homes, especially in the healthcare industry. This paper focuses on IoT in the healthcare domain.
Mohammed Mohammed Raoof +2 more
doaj +1 more source
The Importance of Developing Preventive Techniques for SQL Injection Attacks
Many intentionally vulnerable web applications are circulating on the Internet that serve as a legal test ground for practicing SQL injection attacks. For demonstration purposes the attacks will target an Acunetix test web application created using PHP ...
Nenad Bedeković +3 more
doaj

