Results 81 to 90 of about 10,646 (208)

Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service

open access: yes, 2016
Database as a service provides services for accessing and managing customers data which provides ease of access, and the cost is less for these services. There is a possibility that the DBaaS service provider may not be trusted, and data may be stored on
E Bertino   +3 more
core   +1 more source

Detection of SQL Injection Attacks Based on Supervised Machine Learning Algorithms: A Review

open access: yesInternational Journal of Informatics, Information System and Computer Engineering
In the ever-changing world of cybersecurity, it is becoming more important to ensure integrity of web applications as well as securing sensitive data.
Hilmi Salih Abdullah   +1 more
doaj   +1 more source

Web Security Detection Tool [PDF]

open access: yes, 2008
According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]
Agashe, Abhishek
core   +1 more source

Critical issue to consider while developing SQL injection prevention mechanism [PDF]

open access: yes, 2015
SQL injection vulnerability is the one of the most common web-based application vulnerabilities that can be exploited by SQL injection attack to gain access to restricted data, bypass authentication mechanism and execute unauthorized data manipulation ...
Aliero, Muhammad Saidu   +3 more
core  

Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

open access: yes, 2010
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks.
Adam Kieyzun   +32 more
core   +2 more sources

A Study on SQL Injection Attacks.

open access: yes, 2022
Some web applications have inherent vulnerabilities that allow hackers to get unauthorized access to confidential and private data in an organization. SQL (structured query language) injection attacks remain to be a serious threat to web applications. It is one of the most used mechanisms by cyberattacks to steal or compromise sensitive data stored in ...
openaire   +1 more source

AI-driven attacks on database security: taxonomy and defense strategies [PDF]

open access: yesEngineering and Technology Journal
Artificial intelligence has introduced both unprecedented capabilities and novel vulnerabilities into database environments, enabling highly adaptive attacks that can evade traditional defenses.
Diyar Naaman, Berivan Ahmed, Hajar Yasin
doaj   +1 more source

Anomaly-Based Method for Detecting Multiple Classes of Network Attacks

open access: yesInformation, 2019
The article discusses the problem of detecting network attacks on a web server. The attention is focused on two common types of attacks: “denial of service„ and “code injection„.
Anastasia Gurina, Vladimir Eliseev
doaj   +1 more source

GMSA: Gathering Multiple Signatures Approach to Defend Against Code Injection Attacks

open access: yesIEEE Access, 2018
Code injection attacks (CIAs) exploit security vulnerabilities and computer bugs that are caused by processing invalid codes. CIA is a problem which hackers attempt to introduce to any new method, their objective being to bypass the protection system. In
Hussein Alnabulsi   +2 more
doaj   +1 more source

Threats to Electronic Voting Systems in Canada

open access: yesThe Journal of Intelligence, Conflict and Warfare, 2019
This report is organized into the following points: a) what is the specific electronic voting vulnerability being considered (SQL Injection)? b) how are these attacks carried out against the electoral system?
CASIS-Vancouver
doaj   +1 more source

Home - About - Disclaimer - Privacy