Results 81 to 90 of about 10,242 (187)

Early PCOS Detection: A Comparative Analysis of Traditional and Ensemble Machine Learning Models With Advanced Feature Selection

open access: yesEngineering Reports, Volume 7, Issue 2, February 2025.
A comparative analysis of traditional and ensemble machine learning models with advanced feature selection to detect polycystic ovary syndrome. ABSTRACT PCOS (polycystic ovary syndrome) is a common hormonal disorder that affects many women during their reproductive years.
Khandaker Mohammad Mohi Uddin   +4 more
wiley   +1 more source

A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)

open access: yes, 2017
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando   +4 more
core   +1 more source

REMEDIATE: Improving Network and Middlebox Resilience With Virtualisation

open access: yesInternational Journal of Network Management, Volume 35, Issue 1, January/February 2025.
ABSTRACT The increasing demand for low‐latency, high‐bandwidth connectivity has introduced novel challenges to delivering strong resilience guarantees in production network environments. Closed hardware platforms, known as middleboxes, that lack visibility and support for state retention remain a key challenge for continuous service delivery during ...
Lyn Hill   +3 more
wiley   +1 more source

Reinforcing Cloud Attack Tolerance on a Large Scale: Advanced Blockchain Technologies With Hierarchical Risk and Smart Contracts

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
We propose a blockchain‐based system to enhance cloud systems' resilience against distributed denial of service attacks. Our approach integrates a hierarchical risk‐based attack tolerance mechanism with smart contracts, dynamically estimating risks at local, cluster, and global levels using Dempster–Shafer theory. Simulations show improved availability,
Faiza Benmenzer   +2 more
wiley   +1 more source

Devising Solution to SQL Injection Attacks

open access: yesInternational Journal of Computer Applications, 2016
Web application plays an important role in different fields like finance sector, business, shopping etc. There is no. of web application vulnerabilities such as SQL injection, Buffer overflow etc. Above these SQL Injection vulnerabilities are very harmful for web applications.
Shivam Choudhary   +2 more
openaire   +1 more source

Discovery and research of network security vulnerabilities based on Web application

open access: yes网络与信息安全学报, 2016
Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS ...
Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU
doaj   +3 more sources

IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks

open access: yesThe Journal of Engineering
The Internet of Things (IoT) technology is everywhere; they are making things more intelligent and connected, from smart cities to transport systems to homes, especially in the healthcare industry. This paper focuses on IoT in the healthcare domain.
Mohammed Mohammed Raoof   +2 more
doaj   +1 more source

The Importance of Developing Preventive Techniques for SQL Injection Attacks

open access: yesTehnički Glasnik, 2022
Many intentionally vulnerable web applications are circulating on the Internet that serve as a legal test ground for practicing SQL injection attacks. For demonstration purposes the attacks will target an Acunetix test web application created using PHP ...
Nenad Bedeković   +3 more
doaj  

SQL injection attack: Detection, prioritization & prevention

open access: yesJournal of Information Security and Applications
Web applications have become central in the digital landscape, providing users instant access to information and allowing businesses to expand their reach. Injection attacks, such as SQL injection (SQLi), are prominent attacks on web applications, given that most web applications integrate a database system.
Alan Paul   +2 more
openaire   +3 more sources

Anomaly-Based Method for Detecting Multiple Classes of Network Attacks

open access: yesInformation, 2019
The article discusses the problem of detecting network attacks on a web server. The attention is focused on two common types of attacks: “denial of service„ and “code injection„.
Anastasia Gurina, Vladimir Eliseev
doaj   +1 more source

Home - About - Disclaimer - Privacy