Results 71 to 80 of about 980 (175)

Anomaly-Based Method for Detecting Multiple Classes of Network Attacks

open access: yesInformation, 2019
The article discusses the problem of detecting network attacks on a web server. The attention is focused on two common types of attacks: “denial of service„ and “code injection„.
Anastasia Gurina, Vladimir Eliseev
doaj   +1 more source

Application of Artificial Intelligence in Detecting SQL Injection Attacks

open access: yesJOIV: International Journal on Informatics Visualization
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped.
Nwabudike Augustine   +3 more
doaj   +1 more source

SQL Injection Attack Roadmap and Fusion

open access: yesIndian Journal of Science and Technology, 2016
With SQL Injection, an attacker can change the intended effect of dynamically generated query in a web Application. This can lead to unauthorized access to the database underlying web application, and harmful transactions on the potentially sensitive information contained in the database.
Umar, Kabir   +4 more
openaire   +1 more source

Dual Stage SQL Injection Attacks

open access: yes, 2009
I came across quite an interesting SQL Injection scenario today. The software in which the vulnerability resides will remain anonymous until fixed, but an abstracted version of the scenario can safely be outlined below. The objective of the software is to restrict user accounts to certain IP addresses when accessing a bulletin board.
openaire   +2 more sources

Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection

open access: yesIET Information Security
In the past decade, cybersecurity has become increasingly significant, driven largely by the increase in cybersecurity threats. Among these threats, SQL injection attacks stand out as a particularly common method of cyber attack.
Yixian Liu, Yupeng Dai
doaj   +1 more source

Security Performance Analysis of Photography Service System

open access: yesJournal of Computing Research and Innovation, 2019
Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers.
Nur Khairani Kamarudin   +4 more
doaj   +1 more source

A Hybrid Deep Learning Model for SQL Injection Attack Detection

open access: yesIEEE Access
An increasing number of web application services raises significant security concerns. Online access to these applications exposes them to multiple cyberattacks.
Emanuel N. Casmiry   +2 more
doaj   +1 more source

Abstract

open access: yes
JPGN Reports, Volume 6, Issue S2, Page S1-S814, September 2025.
wiley   +1 more source

Poster Sessions

open access: yes
HemaSphere, Volume 9, Issue S1, June 2025.
wiley   +1 more source

Detecting and Defeating SQL Injection Attacks

open access: yesInternational Journal of Information and Electronics Engineering, 2011
Abstract —The increasing dependence on web applications have made them a natural target for attackers. Among these attacks SQL Injection Attacks (SQLIA) are the most prevalent. In this paper we propose a SQL injection vulnerability scanner that is light-weight, fast and has a low false positive rate. These scanners prove as a practical tool to discover
openaire   +1 more source

Home - About - Disclaimer - Privacy