Results 81 to 90 of about 10,242 (187)
A comparative analysis of traditional and ensemble machine learning models with advanced feature selection to detect polycystic ovary syndrome. ABSTRACT PCOS (polycystic ovary syndrome) is a common hormonal disorder that affects many women during their reproductive years.
Khandaker Mohammad Mohi Uddin +4 more
wiley +1 more source
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando +4 more
core +1 more source
REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation
ABSTRACT The increasing demand for low‐latency, high‐bandwidth connectivity has introduced novel challenges to delivering strong resilience guarantees in production network environments. Closed hardware platforms, known as middleboxes, that lack visibility and support for state retention remain a key challenge for continuous service delivery during ...
Lyn Hill +3 more
wiley +1 more source
We propose a blockchain‐based system to enhance cloud systems' resilience against distributed denial of service attacks. Our approach integrates a hierarchical risk‐based attack tolerance mechanism with smart contracts, dynamically estimating risks at local, cluster, and global levels using Dempster–Shafer theory. Simulations show improved availability,
Faiza Benmenzer +2 more
wiley +1 more source
Devising Solution to SQL Injection Attacks
Web application plays an important role in different fields like finance sector, business, shopping etc. There is no. of web application vulnerabilities such as SQL injection, Buffer overflow etc. Above these SQL Injection vulnerabilities are very harmful for web applications.
Shivam Choudhary +2 more
openaire +1 more source
Discovery and research of network security vulnerabilities based on Web application
Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS ...
Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU
doaj +3 more sources
IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks
The Internet of Things (IoT) technology is everywhere; they are making things more intelligent and connected, from smart cities to transport systems to homes, especially in the healthcare industry. This paper focuses on IoT in the healthcare domain.
Mohammed Mohammed Raoof +2 more
doaj +1 more source
The Importance of Developing Preventive Techniques for SQL Injection Attacks
Many intentionally vulnerable web applications are circulating on the Internet that serve as a legal test ground for practicing SQL injection attacks. For demonstration purposes the attacks will target an Acunetix test web application created using PHP ...
Nenad Bedeković +3 more
doaj
SQL injection attack: Detection, prioritization & prevention
Web applications have become central in the digital landscape, providing users instant access to information and allowing businesses to expand their reach. Injection attacks, such as SQL injection (SQLi), are prominent attacks on web applications, given that most web applications integrate a database system.
Alan Paul +2 more
openaire +3 more sources
Anomaly-Based Method for Detecting Multiple Classes of Network Attacks
The article discusses the problem of detecting network attacks on a web server. The attention is focused on two common types of attacks: “denial of service„ and “code injection„.
Anastasia Gurina, Vladimir Eliseev
doaj +1 more source

