Results 31 to 40 of about 10,646 (208)

Using Nlp Techniques To Detect Sql Injection Attack

open access: yesمجلة جامعة دمشق للعلوم الهندسية, 2023
Most of the applications used on the internet are Web-Based Applications, that accept critical information from users and store this information in databases.
زاهر الشامي   +1 more
doaj  

Framework of SQL Injection Attack

open access: yesCoRR, 2012
With the changing demographics of globalization, the emergence and prevalence of web application have acquired a central and pivotal role in the domains of technology and advancements. It thus becomes imperative to probe deeply into the architecture, significance and different facets of usages.
Neha Patwari, Parvati Bhurani
openaire   +2 more sources

Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks

open access: yesFuture Internet, 2023
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand,
Fahad M. Alotaibi   +1 more
doaj   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Semaglutide 2.4 mg Cardiometabolic Long‐Term Effects in Patients With Obesity or Overweight in a Real‐World Setting: A Retrospective Cohort Study in the United States (SMILE)

open access: yesDiabetes, Obesity and Metabolism, EarlyView.
ABSTRACT Aims To evaluate the real‐world associations between semaglutide 2.4 mg and cardiometabolic comorbidities, biomarkers and cardiovascular risk among adults with overweight or obesity. Methods This retrospective cohort study used US claims data and laboratory measurements from the Komodo Research Database (2016–2024). Adults with obesity or with
Aleksandrina Ruseva   +11 more
wiley   +1 more source

idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining [PDF]

open access: yes, 2013
This study presents a multiagent architecture aimed at detecting SQL injection attacks, which are one of the most prevalent threats for modern databases.
Bajo, Javier   +5 more
core   +1 more source

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks

open access: yesThe Journal of Engineering
The Internet of Things (IoT) technology is everywhere; they are making things more intelligent and connected, from smart cities to transport systems to homes, especially in the healthcare industry. This paper focuses on IoT in the healthcare domain.
Mohammed Mohammed Raoof   +2 more
doaj   +1 more source

Perancangan Keamanan Sistem Menggunakan Algoritma Honeypot pada Aplikasi Krs Online (Studi Kasus : Sekolah Tinggi Teknologi Adisutjipto) [PDF]

open access: yes, 2013
Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force.
Sajati, H. (Haruno)   +2 more
core  

Metabolomic responses are more sensitive in muscle than serum following 28 days of arduous exercise with erythropoietin administration

open access: yesExperimental Physiology, Volume 111, Issue 5, Page 2613-2626, 1 May 2026.
Abstract Erythropoietin (EPO) administration stimulates haematological and non‐haematological adaptations that alter substrate oxidation and enhance aerobic performance. The effects of strenuous exercise and EPO on metabolites, and whether any effect is associated with haematological and non‐haematological adaptations, has not been assessed.
Devin J. Drummer   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy