Results 71 to 80 of about 10,646 (208)
ABSTRACT The development of an in‐house accounting bot—an artificial intelligence (AI) assistant capable of generating internally structured bookkeeping double‐entry posting schemes—is explored in this paper. The processes of curating a suitable dataset, selecting, and fine‐tuning a seven‐billion‐parameter language model, categorized as a small ...
Mario Zupan
wiley +1 more source
Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified.
Bahman Arasteh +3 more
doaj +1 more source
Reaction to New Security Threat Class [PDF]
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core
Application of Artificial Intelligence in Detecting SQL Injection Attacks
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped.
Nwabudike Augustine +3 more
doaj +1 more source
Analysis of Different Types of Network Attacks on the GNS3 Platform
In this study, DDoS, SQL injection and XSS attacks that hackers use most in cyber attacks are modeled on GNS3 emulator platform and network security is analyzed.
Burak Bitikçi, Resul Daş
doaj +1 more source
Tempus is a testing system that enhances Evolutionary Mutation Testing (EMT) by using ProfileBased individual generation (PBig). PBig generates new individuals based on previous knowledge from other programs about which operators are more likely to produce strong mutants.
Lorena Gutiérrez‐Madroñal +2 more
wiley +1 more source
How Can Cryptography Secure Online Assessments Against Academic Dishonesty?
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi +2 more
wiley +1 more source
AUTOMATIC DETECTION ALGORITHM FOR VULNERABILITY OF SQL-INJECTION
Attacks to web applications are a relatively new type of attack. If the web application does not filter incoming parameters properly, then attackers can get the opportunity to falsify the database using the form on the web page or by changing other ...
A.T. Рахманов +3 more
doaj +1 more source
Analysis of the defending possibilities against SQL Injection attacks
The article describes various protection methods of database and types of SQL Injection attacks. These are extremely dangerous attacks because they threaten the confidentiality of sensitive data.
Chrystian Byzdra, Grzegorz Kozieł
doaj +1 more source
Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment [PDF]
The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses.
Barnejee, Bikramjit +3 more
core +1 more source

