Results 151 to 160 of about 10,646 (208)
A novel deep learning framework with temporal attention convolutional networks for intrusion detection in IoT and IIoT networks. [PDF]
Ghosh KP +4 more
europepmc +1 more source
Highly accurate anomaly based intrusion detection through integration of the local outlier factor and convolutional neural network. [PDF]
Rabih R +3 more
europepmc +1 more source
A NoSQL document based eCRF system for study of vaccines with variable adverse events case study on COVID19 vaccines. [PDF]
Nasiri Khoshroudi SH +2 more
europepmc +1 more source
Cybersecurity as it relates to perfusion. [PDF]
Lung K.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
SQL-Identifier Injection Attacks
2019 IEEE Conference on Communications and Network Security (CNS), 2019This paper defines a class of SQL-injection attacks that are based on injecting identifiers, such as table and column names, into SQL statements. An automated analysis of GitHub shows that 15.7% of 120,412 posted Java source files contain code vulnerable to SQL-Identifier Injection Attacks (SQL-IDIAs).
Dmitry B Goldgof, Jay Ligatti
exaly +2 more sources
SQL Injection Attacks and Prevention
2023 6th International Conference on Information Systems and Computer Networks (ISCON), 2023Kashish Gaur +5 more
exaly +2 more sources
Advances in Engineering Innovation, 2023
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire +1 more source
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire +1 more source
SQL injection attacks with the AMPA suite
International Journal of Electronic Security and Digital Forensics, 2013The suite of tools presented here was developed to exploit the lack of sanitisation found in user inputs that reached a target database and sometimes even the server. The focus for the design of the tools was a BLIND SQL injection, the verbosity of the attack and the possibility to inject a web shell which enabled Meterpreter to open a reverse ...
Simone Cecchini, Diane Gan
openaire +1 more source
Testing Snort with SQL Injection Attacks
Proceedings of the Ninth International C* Conference on Computer Science & Software Engineering - C3S2E '16, 2016Currently, information security is a significant challenge in the information era because businesses store critical information in databases. Therefore, databases need to be a secure component of an enterprise. Organizations use Intrusion Detection Systems (IDS) as a security infrastructure component, of which a popular implementation is Snort. In this
Rui Silva +2 more
openaire +1 more source

