Results 71 to 80 of about 10,646 (208)

Developing an Accounting Virtual Assistant Through Supervised Fine‐Tuning (SFT) of a Small Language Model (SLM)

open access: yesIntelligent Systems in Accounting, Finance and Management, Volume 32, Issue 3, September 2025.
ABSTRACT The development of an in‐house accounting bot—an artificial intelligence (AI) assistant capable of generating internally structured bookkeeping double‐entry posting schemes—is explored in this paper. The processes of curating a suitable dataset, selecting, and fine‐tuning a seven‐billion‐parameter language model, categorized as a small ...
Mario Zupan
wiley   +1 more source

Effective SQL Injection Detection: A Fusion of Binary Olympiad Optimizer and Classification Algorithm

open access: yesMathematics
Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified.
Bahman Arasteh   +3 more
doaj   +1 more source

Reaction to New Security Threat Class [PDF]

open access: yes, 2014
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core  

Application of Artificial Intelligence in Detecting SQL Injection Attacks

open access: yesJOIV: International Journal on Informatics Visualization
SQL injection attacks rank among the most significant threats to data security. While AI and machine learning have advanced considerably, their application in cybersecurity remains relatively undeveloped.
Nwabudike Augustine   +3 more
doaj   +1 more source

Analysis of Different Types of Network Attacks on the GNS3 Platform

open access: yesSakarya University Journal of Computer and Information Sciences, 2020
In this study, DDoS, SQL injection and XSS attacks that hackers use most in cyber attacks are modeled on GNS3 emulator platform and network security is analyzed.
Burak Bitikçi, Resul Daş
doaj   +1 more source

Tempus: An Evolutionary Mutation Testing System on Event‐Based Systems With Profile‐Based Individual Generation

open access: yesSoftware Testing, Verification and Reliability, Volume 35, Issue 5, August 2025.
Tempus is a testing system that enhances Evolutionary Mutation Testing (EMT) by using ProfileBased individual generation (PBig). PBig generates new individuals based on previous knowledge from other programs about which operators are more likely to produce strong mutants.
Lorena Gutiérrez‐Madroñal   +2 more
wiley   +1 more source

How Can Cryptography Secure Online Assessments Against Academic Dishonesty?

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 4, July/August 2025.
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi   +2 more
wiley   +1 more source

AUTOMATIC DETECTION ALGORITHM FOR VULNERABILITY OF SQL-INJECTION

open access: yesМіжнародний науково-технічний журнал "Проблеми керування та інформатики"
Attacks to web applications are a relatively new type of attack. If the web application does not filter incoming parameters properly, then attackers can get the opportunity to falsify the database using the form on the web page or by changing other ...
A.T. Рахманов   +3 more
doaj   +1 more source

Analysis of the defending possibilities against SQL Injection attacks

open access: yesJournal of Computer Sciences Institute, 2019
The article describes various protection methods of database and types of SQL Injection attacks. These are extremely dangerous attacks because they threaten the confidentiality of sensitive data.
Chrystian Byzdra, Grzegorz Kozieł
doaj   +1 more source

Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment [PDF]

open access: yes, 2013
The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses.
Barnejee, Bikramjit   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy