Results 51 to 60 of about 10,646 (208)

SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]

open access: yes, 2018
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core   +1 more source

A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)

open access: yes, 2017
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando   +4 more
core   +1 more source

Annual Weather Patterns Drive Large Pulses of Saline Submarine Groundwater Discharge and Major Summer Inputs of Nutrients to the South Atlantic Bight

open access: yesJournal of Geophysical Research: Oceans, Volume 131, Issue 1, January 2026.
Abstract Submarine groundwater discharge (SGD) is a significant source of nutrients to continental shelf waters. Increasing evidence suggests that most of this flow is saline (∼seawater salinity) and occurs across broad continental shelves, making it challenging to observe.
Jacob Vincent   +7 more
wiley   +1 more source

Tool for SQL Injection Vulnerability Detection [PDF]

open access: yes, 2013
Bakalářská práce je zaměřena na problematiku bezpečnostní chyby SQL injection. V práci jsou popsány běžně používané postupy při útocích na informační systémy a jsou také probrány možnosti obrany včetně uvedení způsobů správné validace vstupů aplikace ...
Kutypa, Matouš
core  

AI‐Powered Defense: Leveraging Deep Learning for Effective Malware Detection

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2026, Issue 1, 2026.
Traditional malware detection techniques frequently fail to detect and stop malicious activity in an era where cyber threats are becoming more complex. Any software that enters a computer system without the administrator’s consent is considered malicious software.
Nancy Awadallah Awad   +1 more
wiley   +1 more source

SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN

open access: yesIEEE Access, 2019
An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security Project (OWASP).
Xin Xie   +4 more
doaj   +1 more source

SQL Injection in Oracle: An Exploration of Vulnerabilities [PDF]

open access: yes, 2012
Structured Query Language (SQL) injection is one of the most devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL Injection can compromise usernames, passwords,
Ansari, Sid, Sykes, Edward R.
core  

Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa   +5 more
wiley   +1 more source

Analysis of SQL Injection Attack

open access: yesInternational Journal of Computer Science and Informatics, 2013
SQL injection attacks are a serious security threat to Web applications. They allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitive information these database contain. Various researchers and practitioners have proposed various methods to address the SQL injection problem. To address
Jayeeta Majumder, Gargi Saha
openaire   +1 more source

Automated Fix Generator for SQL Injection Attacks [PDF]

open access: yes2008 19th International Symposium on Software Reliability Engineering (ISSRE), 2008
A critical problem facing todaypsilas Internet community is the increasing number of attacks exploiting flaws found in Web applications. This paper specifically targets input validation vulnerabilities found in SQL queries that may lead to SQL Injection Attacks (SQLIAs).
Fred Dysart, Mark Sherriff
openaire   +1 more source

Home - About - Disclaimer - Privacy