Loading…
Neural network based single index evaluation for SQL injection attack detection in health care data
Nagabhooshanam, N., ganapathy, N. Bala sundara, Ravindra Murthy, C., Mohammed Saleh, Al Ansari, CosioBorda, Ricardo Fernando
Published in Measurement. Sensors (01.06.2023)
Published in Measurement. Sensors (01.06.2023)
Get full text
Journal Article
Loading…
Numerical encoding to Tame SQL injection attacks
Uwagbole, Solomon Ogbomon, Buchanan, William J., Lu Fan
Published in IEEE/IFIP Network Operations and Management Symposium (01.04.2016)
Published in IEEE/IFIP Network Operations and Management Symposium (01.04.2016)
Get full text
Conference Proceeding
Journal Article
Loading…
Network Forensics for Detecting SQL Injection Attacks Using NIST Method
Caesarano, Arif Roid, Riadi, Imam
Published in International journal of cyber-security and digital forensics (01.10.2018)
Get full text
Published in International journal of cyber-security and digital forensics (01.10.2018)
Journal Article
Loading…
Runtime Monitoring Framework for SQL Injection Attacks
Dharam, Ramya, G. Shiva, Sajjan
Published in International Journal of Engineering and Technology (01.12.2014)
Published in International Journal of Engineering and Technology (01.12.2014)
Get full text
Journal Article
Loading…
Authentication Enhancement Against SQL Injection Attacks (SQLIAs)
Albalawi, Samar M., Mohamed, Awad M. Awadelkarim
Published in 2022 2nd International Conference on Computing and Information Technology (ICCIT) (25.01.2022)
Published in 2022 2nd International Conference on Computing and Information Technology (ICCIT) (25.01.2022)
Get full text
Conference Proceeding
Loading…
Overview of SQL Injection Defense Mechanisms
Tasevski, Igor, Jakimoski, Kire
Published in 2020 28th Telecommunications Forum (TELFOR) (24.11.2020)
Published in 2020 28th Telecommunications Forum (TELFOR) (24.11.2020)
Get full text
Conference Proceeding
Loading…
Fortifying Database Security: Integrating Advanced Honeypot Technology for Resilient SQL Injection Defense
U, Kumaran, Swetha, Thammisetty, Reddy, G. S. N. Santhosh, Ala, Harini, Nagarajan, Senthil Murugan, Umah, B.
Published in 2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE) (09.05.2024)
Published in 2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE) (09.05.2024)
Get full text
Conference Proceeding
Loading…
Detecting Web Attacks From HTTP Weblogs Using Variational LSTM Autoencoder Deviation Network
Jagat, Rikhi Ram, Sisodia, Dilip Singh, Singh, Pradeep
Published in IEEE transactions on services computing (01.09.2024)
Published in IEEE transactions on services computing (01.09.2024)
Get full text
Journal Article
Loading…
Runtime monitoring technique to handle tautology based SQL injection attacks
Dharam, Ramya, Shiva, Sajjan G
Published in International journal of cyber-security and digital forensics (01.07.2012)
Get full text
Published in International journal of cyber-security and digital forensics (01.07.2012)
Journal Article
Loading…
Encountering SQL Injection in Web Applications
Joshi, Padma N., Raju, M. B., Ravishankar, N., Ravi, N. Ch
Published in 2018 Second International Conference on Computing Methodologies and Communication (ICCMC) (01.02.2018)
Published in 2018 Second International Conference on Computing Methodologies and Communication (ICCMC) (01.02.2018)
Get full text
Conference Proceeding
Loading…
Advanced Artificial Intelligence Models and Its Applications
Year of Publication 2023
Get full text
eBook
Loading…
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack
Uwagbole, Solomon Ogbomon, Buchanan, William J., Lu Fan
Published in International Conference on Emerging Security Technologies (01.09.2017)
Published in International Conference on Emerging Security Technologies (01.09.2017)
Get full text
Conference Proceeding
Loading…
A design review: Concepts for mitigating SQL injection attacks
Pearson, Ed, Bethel, Cindy L.
Published in 2016 4th International Symposium on Digital Forensic and Security (ISDFS) (01.04.2016)
Published in 2016 4th International Symposium on Digital Forensic and Security (ISDFS) (01.04.2016)
Get full text
Conference Proceeding
Loading…
Applied web Traffic Analysis for Numerical Encoding of SQL Injection Attack Features
Uwagbole, Solomon Ogbomon, Buchanan, William, Fan, Lu
Published in European Conference on Cyber Warfare and Security (01.07.2016)
Get full text
Published in European Conference on Cyber Warfare and Security (01.07.2016)
Conference Proceeding
Loading…
Sql Injection Attacks And Prevention Techniques
Garcia, Mario
Published in Association for Engineering Education - Engineering Library Division Papers (18.06.2006)
Get full text
Published in Association for Engineering Education - Engineering Library Division Papers (18.06.2006)
Conference Proceeding
Loading…
Improved Vulnerability Handling Framework to Automatically Fix Vulnerable Web Applications
Funaoka, Yuki, Koide, Hiroshi
Published in International Symposium on Computing and Networking Workshops (Online) (27.11.2023)
Published in International Symposium on Computing and Networking Workshops (Online) (27.11.2023)
Get full text
Conference Proceeding
Loading…
Innovative Teaching and Learning Experiences in Network Attacks and Defense
Weimin Wei, Liping Sun
Published in 2012 Eighth International Conference on Computational Intelligence and Security (01.11.2012)
Published in 2012 Eighth International Conference on Computational Intelligence and Security (01.11.2012)
Get full text
Conference Proceeding
Loading…
A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
Saadi, Zena Mohammad, Sadiq, Ahmed T., Akif, Omar Z., Farhan, Alaa K.
Published in Electronics (Basel) (01.08.2024)
Published in Electronics (Basel) (01.08.2024)
Get full text
Journal Article
Loading…