Advancing database security: a comprehensive systematic mapping study of potential challenges

A Iqbal, SU Khan, M Niazi, M Humayun, NU Sama… - Wireless …, 2023 - Springer
The value of data to a company means that it must be protected. When it comes to
safeguarding their local and worldwide databases, businesses face a number of challenges …

[HTML][HTML] Error messages in relational database management systems: A comparison of effectiveness, usefulness, and user confidence

T Taipalus, H Grahn, H Ghanbari - Journal of Systems and Software, 2021 - Elsevier
The database and the database management system (DBMS) are two of the main
components of any information system. Structured Query Language (SQL) is the most …

An adaptive system for detecting malicious queries in web attacks

Y Dong, Y Zhang, H Ma, Q Wu, Q Liu, K Wang… - Science China …, 2018 - Springer
Web request query strings (queries), which pass parameters to a referenced resource, are
always manipulated by attackers to retrieve sensitive data and even take full control of victim …

Systematic literature review of particle swarm optimization implementation for time-dependent vehicle routing problem

M Diah, A Setyanto, ET Luthfi - Jurnal Online Informatika, 2022 - join.if.uinsgd.ac.id
Time-dependent VRP (TDVRP) is one of the three VRP variants that have not been widely
explored in research in the field of operational research, while Particle Swarm Optimization …

A survey on SQL injection attacks, detection and prevention techniques-a tertiary study

M Hallo, G Suntaxi - International Journal of Security and …, 2022 - inderscienceonline.com
This paper presents a tertiary systematic literature review of SQL injection attacks based on
previous secondary systematic literature reviews and systematic mappings. We identify the …

Token based detection and neural network based reconstruction framework against code injection vulnerabilities

TK George, KP Jacob, RK James - Journal of Information Security and …, 2018 - Elsevier
Security vulnerabilities are frequently detected and exploited in modern web applications.
Intruders obtain unrestricted access to the information stored at the back-end database …

Testing of network security systems through DoS, SQL injection, reverse TCP and social engineering attacks

A Maraj, E Rogova, G Jakupi - International Journal of Grid …, 2020 - inderscienceonline.com
Cyber-attacks are happening with an ever-increasing frequency with the goal of gaining
access to sensitive information. These attacks can cause huge damage to all kinds of …

An agent based intelligent dynamic vulnerability analysis framework for critical SQLIA attacks: Intelligent SQLIA vulnerability analyzer agent

JM Dharmalingam, M Eswaran - International Journal of Intelligent …, 2018 - igi-global.com
This article describes how software vulnerability analysis and testing for web applications
should detect not only the common attacks but also dynamic vulnerability attacks. These are …

Exposing SQL injection vulnerability through penetration test based on finite state machine

L Liu, J Xu, C Guo, J Kang, S Xu… - 2016 2nd IEEE …, 2016 - ieeexplore.ieee.org
Penetration test is one of the most used SQL Injection Vulnerability (SQLIV) testing
technology. Focused on the insufficiency of test accuracy problem in SQLIV black-box …

W3BnNr: An Automated tool for information gathering, vulnerability scanning, attacking and reporting for injection attacks on web application

M Muralidharan, KB Babu… - … Advanced Computing and …, 2023 - ieeexplore.ieee.org
Web applications must be protected from security threats due to the widespread use of the
internet and web applications in today's society. In fact, over 75 percent of currently available …