Results 71 to 80 of about 10,242 (187)
Sql Injection Attacks And Prevention Techniques [PDF]
Comment: 12 ...
openaire +2 more sources
ABSTRACT This article presents the architecture, design and validation of a microservice orchestration approach that improves the flexibility of heterogeneous microservice‐based platforms. Improving user experience and interaction for time‐critical applications are aspects that were primary objectives for the design of the architecture.
Daniela Delinschi +4 more
wiley +1 more source
Algorithms and software solutions for SQL injection vulnerability testing in web applications
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk +3 more
doaj +1 more source
Web Security Detection Tool [PDF]
According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]
Agashe, Abhishek
core +1 more source
Search Multiple Types of Research Assets From Jupyter Notebook
ABSTRACT Objective Data science and machine learning methodologies are essential to address complex scientific challenges across various domains. These advancements generate numerous research assets such as datasets, software tools, and workflows, which are shared within the open science community. Concurrently, computational notebook environments like
Na Li, Siamak Farshidi, Zhiming Zhao
wiley +1 more source
RF‐FLIDS: A Novel Hybrid Intrusion Detection Model for Enhanced Anomaly Detection in IoT Networks
ABSTRACT The rapid proliferation of Internet of Things (IoT) technology has transformed modern industries, introducing significant security vulnerabilities that necessitate practical intrusion detection systems (IDSs). While random forest (RF) has shown promise for anomaly detection in IoT networks, its inherent bias toward majority classes in ...
Hakeem Babalola Akande +4 more
wiley +1 more source
Implementasi Penetration Testing Pada Sistem Informasi Terpadu Layanan Prodi Menggunakan Framework Issaf [PDF]
Keamanan sistem informasi menjadi aspek kritis dalam lingkungan teknologi informasi yang terus berkembang. Penetration testing adalah salah satu metode yang efektif untuk mengidentifikasi dan menguji keamanan dalam sebuah simulasi serangan terhadap suatu
Anisa Sholawati +2 more
doaj +1 more source
APHRODITE: an Anomaly-based Architecture for False Positive Reduction [PDF]
We present APHRODITE, an architecture designed to reduce false positives in network intrusion detection systems. APHRODITE works by detecting anomalies in the output traffic, and by correlating them with the alerts raised by the NIDS working on the input
Bolzoni, Damiano, Etalle, Sandro
core +4 more sources
Evaluating Adversarial Attacks Against Artificial Intelligence Systems in Application Deployments
This article evaluates the effectiveness and real‐world implications of adversarial attacks on AI systems in application deployments, highlighting practical vulnerabilities and proposing strategies for improved robustness and defense. ABSTRACT Businesses have invested billions into artificial intelligence (AI) applications, leading to a sharp rise in ...
Lera Leonteva
wiley +1 more source
Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment [PDF]
The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses.
Barnejee, Bikramjit +3 more
core +1 more source

