Results 61 to 70 of about 10,646 (208)

A Deep Learning Approach Using Optimized LSTM for Anomaly‐Based Network Intrusion Detection

open access: yesJournal of Engineering, Volume 2026, Issue 1, 2026.
With the exponential rise in cyber threats, anomaly‐based network intrusion detection systems (NIDSs) have become critical for maintaining robust cybersecurity. This article proposes an optimized long short‐term memory (LSTM) deep learning (DL) model specifically designed to detect anomalies in network traffic.
Samia Dardouri, Shikha Binwal
wiley   +1 more source

Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security [PDF]

open access: yesITM Web of Conferences
A pervasive security issue in web applications is database injection, enabling attackers to alter SQL queries in order to get unauthorized access to confidential information.
Lu Zhexi
doaj   +1 more source

A Comprehensive Survey on LLM‐Based Network Management and Operations

open access: yesInternational Journal of Network Management, Volume 35, Issue 6, November/December 2025.
ABSTRACT The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule‐based methods, adopting advanced artificial intelligence (AI)‐driven
Jibum Hong   +2 more
wiley   +1 more source

Algorithms and software solutions for SQL injection vulnerability testing in web applications

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, 2018
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk   +3 more
doaj   +1 more source

Preventing SQL Injection Attacks

open access: yesInternational Journal of Computer Applications, 2012
With the recent rapid increase in web based applications that employ back-end database services, results show that SQL Injection and Remote File Inclusion are the two frequently used exploits rather than using other complicated techniques. With the rise in use of web applications, SQL injection based attacks are gradually increasing and is now one of ...
Vaidhyanathan.G Vaidhyanathan.G   +2 more
openaire   +1 more source

A Modular Dynamic Probabilistic Risk Assessment Framework for Electric Grid Cybersecurity

open access: yesEngineering Reports, Volume 7, Issue 10, October 2025.
This paper presents a modular framework designed for dynamic probabilistic risk assessment of electric grid systems facing cybersecurity threats. The functionality and efficacy of the framework have been demonstrated using an IEEE 14‐bus system in a case study.
Xiaoxu Diao   +6 more
wiley   +1 more source

SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks

open access: yesProcedia Computer Science, 2011
AbstractSecuring the web against frequent cyber attacks is a big concern as attackers usually intend to snitch private information, financial information, deface and damages websites to prove their hacking capabilities. This type of vandalism may drive many corporations that conduct their business through the web to suffer financial and reputation ...
Abdul Bashah Mat Ali   +3 more
openaire   +2 more sources

Automated vulnerability evaluation with large language models and vulnerability ontologies

open access: yesAI Magazine, Volume 46, Issue 3, Fall 2025.
Abstract The National Vulnerability Database (NVD) publishes over a thousand new vulnerabilities monthly, with a projected 25 percent increase in 2024, highlighting the crucial need for rapid vulnerability identification to mitigate cybersecurity attacks and save costs and resources.
Rikhiya Ghosh   +5 more
wiley   +1 more source

Coraza-Based WAF with OWASP CRS for SQL Injection in Multi-Domain Web System

open access: yesJournal of Information Systems and Informatics
This research aims to design and implement a Web Application Firewall (WAF) based on the OWASP Core Rule Set (CRS) to enhance web application protection against SQL Injection attacks.
Muhammad Zaedil   +2 more
doaj   +1 more source

Preventing SQL Injection through Automatic Query Sanitization with ASSIST

open access: yes, 2010
Web applications are becoming an essential part of our everyday lives. Many of our activities are dependent on the functionality and security of these applications. As the scale of these applications grows, injection vulnerabilities such as SQL injection
Gwen Salaün   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy