Results 91 to 100 of about 10,646 (208)
Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core
The Importance of Developing Preventive Techniques for SQL Injection Attacks
Many intentionally vulnerable web applications are circulating on the Internet that serve as a legal test ground for practicing SQL injection attacks. For demonstration purposes the attacks will target an Acunetix test web application created using PHP ...
Nenad Bedeković +3 more
doaj
Assessment of the web application security effectiveness against various methods of network attacks
The article discusses the issue of the security of Internet applications. The most popular types of attacks and methods of securing web applications against them are discussed. The study conducted the effectiveness of security of web applications.
Mateusz Erbel, Piotr Kopniak
doaj +1 more source
A Systematic Literature Review on SQL Injection Attacks
With the increasing use of web applications, concerns for data integrity and security have increased manifolds in the current time. The growth in quantity of internet clients and sites has made the web security circumstances progressively extreme ...
Maryam Mehmood, Asad Ijaz
doaj +1 more source
Detection of SQL injection attacks
Web applications that employ SQL datasets are at serious risk from SQL injection attacks. Using two separate datasets, this study examined the utility of ML classification approaches for identifying SQL injection threats. On two datasets—one taken from the actual world and the other created artificially—random forest (RF), descion tree (DT), k-nearest ...
openaire +1 more source
Detection of the Security Vulnerabilities in Web Applications [PDF]
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect.
Marius POPA
core
This study presents a comprehensive examination of the risks associated with SQL Injection attacks, with a particular focus on the Union Select technique.
Jiho Choi, Young-Ae Jung, Hoon Ko
doaj +1 more source
INFO2009 - Team 'DROP TABLE groups; [PDF]
Edshare for INFO2009 coursework 2 - Team 'DROP TABLE ...
Bull, Samuel +5 more
core
Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection
In the past decade, cybersecurity has become increasingly significant, driven largely by the increase in cybersecurity threats. Among these threats, SQL injection attacks stand out as a particularly common method of cyber attack.
Yixian Liu, Yupeng Dai
doaj +1 more source
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size.
Rui-Teng Lo +2 more
doaj +1 more source

