Search

Your search keyword '"SQL injection"' showing total 1,995 results

Search Constraints

Start Over You searched for: Descriptor "SQL injection" Remove constraint Descriptor: "SQL injection"
1,995 results on '"SQL injection"'

Search Results

1. Security Analysis of SQL Injection Attacks on Multimedia and Journal-Services Sites Using Concatenated Input Validation and Parsing Method (CIVP).

2. TPSQLi: Test Prioritization for SQL Injection Vulnerability Detection in Web Applications.

3. Comparative Analysis of the Performance of Decision Tree and Random Forest Algorithms in SQL Injection Attack Detection

4. SqliGPT: Evaluating and Utilizing Large Language Models for Automated SQL Injection Black-Box Detection.

5. SQL-ИНЪЕКЦИЯЛАРЫНАН ВЕБ-ҚОСЫМШАЛАР ДЕРЕКТЕР ҚОРЫНЫҢ ОСАЛДЫҒЫН ЖӘНЕ ҚОРҒАНЫСЫН ЗЕРТТЕУ

6. Detecting Structured Query Language Injections in Web Microservices Using Machine Learning.

7. Methods of Safe Processing of User-Entered Information in Information Systems

8. Preventing SQL Injection Attacks on Web Applications for Enhanced Security and CIA Triad Compliance

9. An Advanced Algorithm and Utility for Identifying Critical Web Vulnerabilities with Exceptional Performance

12. Enhancing Web Browser Extensions: Preventing JavaScript Code Injection and Vulnerabilities

13. Fortifying Web Applications: Advanced XSS and SQLi Payload Constructor for Enhanced Security

14. SQL Injection Attack Detection Based on Error Code Knowledge

15. Adversary Simulation of Structured Query Language (SQL) Injection Attack Using Genetic Algorithm for Web Application Firewalls (WAF) Bypass

16. SQL Injection Attack Detection and Prevention Based on Manipulating the SQL Query Input Attributes

17. A deep learning approach based on multi-view consensus for SQL injection detection.

18. PROGESI: A PROxy Grammar to Enhance Web Application Firewall for SQL Injection Prevention

19. TPSQLi: Test Prioritization for SQL Injection Vulnerability Detection in Web Applications

20. Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents.

21. Computer Forensics of Hacked Websites.

22. Discovery of SQL Injection and Depth Review of Deterrence Techniques for Web Applications.

23. Securing Against Advanced Cyber Threats: A Comprehensive Guide to Phishing, XSS, and SQL Injection Defense.

24. СТРАТЕГІЇ ТА ІННОВАЦІЙНІ ПІДХОДИ ДО ЗАХИСТУ БАЗ ДАНИХ В ЕПОХУ ЗРОСТАЮЧИХ КІБЕРЗАГРОЗ.

25. SqliGPT: Evaluating and Utilizing Large Language Models for Automated SQL Injection Black-Box Detection

26. The Effectiveness of Parameterized Queries in Preventing SQL Injection Attacks at Go

27. Systematic Literature Review of Methods Used for SQL Injection Detection Based on Intelligent Algorithms

28. A Clustering-Based Approach for Effective Prevention of SQL Injections

31. SQL Injection and Its Detection Using Machine Learning Algorithms and BERT

32. Tool-Based Prediction of SQL Injection Vulnerabilities and Attacks on Web Applications

33. SQL Injection Detection Using Machine Learning with Different TF-IDF Feature Extraction Approaches

34. ADT-SQLi : An Automated Detection of SQL Injection Vulnerability in Web Applications

35. DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS

36. SQL Injection Detection Using RNN Deep Learning Model

37. Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model.

38. Detecting Structured Query Language Injections in Web Microservices Using Machine Learning

39. An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection.

40. A systematic review of detection and prevention techniques of SQL injection attacks.

41. Web Entity Protection System.

42. A Comparative Analysis of Web Application Vulnerability Tools.

43. AE-Net: Novel Autoencoder-Based Deep Features for SQL Injection Attack Detection

44. Provably throttling SQLI using an enciphering query and secure matching

45. Vulnerability Scanner: Web-based Security Testing.

47. Deep Learning Approach Based on ADASYN for Detection of Web Attacks in the CICIDS2017 Dataset

48. SQL Injection Attacks, Detection Techniques on Web Application Databases

49. Research on SQL Injection Defense Technology Based on Deep Learning

50. Detecting SQL Injection Vulnerabilities Using Nature-inspired Algorithms

Catalog

Books, media, physical & digital resources