Security issues in wireless sensor network—a review

J Grover, S Sharma - 2016 5th International Conference on …, 2016 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor
nodes in an area for the surveillance of generally remote locations. A typical sensor node is …

[PDF][PDF] Detection and prevention of SQL injection attack: a survey

ZS Alwan, MF Younis - … Journal of Computer Science and Mobile …, 2017 - researchgate.net
SQL (structure query language) injection is one of threats to the applications, which are Web-
based application, Mobile application and even desktop application, which are connected to …

[PDF][PDF] SQL injection attacks prevention system technology

FQ Kareem, SY Ameen, AA Salih… - Asian Journal of …, 2021 - researchgate.net
The vulnerabilities in most web applications enable hackers to gain access to confidential
and private information. Structured query injection poses a significant threat to web …

An ensemble classification-based approach to detect attack level of SQL injections

Ö Kasim - Journal of Information Security and Applications, 2021 - Elsevier
Sensitive data including identity information, passwords, financial and business processes
belonging to the user are kept in the databases. These data can be obtained by attackers …

Applications and usage of visual cryptography: A review

A Pandey, S Som - 2016 5th International Conference on …, 2016 - ieeexplore.ieee.org
Visual cryptography is a cryptographic technique which allows visual information to be
encrypted in such a way that decryption becomes a mechanical operation that does not …

ART4SQLi: The ART of SQL injection vulnerability discovery

L Zhang, D Zhang, C Wang, J Zhao… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
SQL injection (SQLi) is one of the chief threats to the security of database-driven Web
applications. It can cause serious security issues such as authentication bypassing, privacy …

A secure IoT-based power plant control using RSA and DES encryption techniques in data link layer

I Hussain, MC Negi, N Pandey - 2017 International Conference …, 2017 - ieeexplore.ieee.org
The rapid amplifying improvement in the field of Internet control gives rise to an imminent
vision where different sectors even in industries are advancing towards the fields in where …

A system dynamics, epidemiological approach for high-level cyber-resilience to zero-day vulnerabilities

DA Sepúlveda Estay - Journal of Simulation, 2023 - Taylor & Francis
Cyber-attacks are serious threats to operations in most industries, enabled by a growing
dependence on Information Technology (IT). To minimise disruptive effects on operations …

A novel method for preventing SQL injection using SHA-1 algorithm and syntax-awareness

Q Temeiza, M Temeiza, J Itmazi - 2017 Joint International …, 2017 - ieeexplore.ieee.org
Nowadays the most used applications are the web based applications, for instance long
range informal communication, shopping, e-learning, banking and social networking are all …

Analysis of IoT security at network layer

R Sharma, N Pandey, SK Khatri - 2017 6th International …, 2017 - ieeexplore.ieee.org
The new future for the connectivity to the world are the IoT devices which interconnect
heterogeneous object with each other. These IoT devices will make an autonomous world …