Cyber security: A review of cyber crimes, security challenges and measures to control

A Verma, C Shri - Vision, 2022 - journals.sagepub.com
The proliferation of the Internet's interconnections has led to a substantial increase in
cyberattack incidents, often with devastating and grave consequences for the organizations …

Android mobile applications vulnerabilities and prevention methods: A review

H Abdullah, SRM Zeebaree - … To Enhance e-learning and Other …, 2021 - ieeexplore.ieee.org
The popularity of mobile applications is rapidly increasing in the age of smartphones and
tablets. Communication, social media, news, sending emails, buying, paying, viewing …

[HTML][HTML] Enhancing the performance of SQL injection attack detection through probabilistic neural networks

FK Alarfaj, NA Khan - Applied Sciences, 2023 - mdpi.com
SQL injection attack is considered one of the most dangerous vulnerabilities exploited to
leak sensitive information, gain unauthorized access, and cause financial loss to individuals …

Web application penetration testing using SQL Injection attack

A Alanda, D Satria, MI Ardhana, AA Dahlan… - … : International Journal on …, 2021 - joiv.org
A web application is a very important requirement in the information and digitalization era.
With the increasing use of the internet and the growing number of web applications, every …

Sql injection detection using machine learning techniques

E Hosam, H Hosny, W Ashraf… - 2021 8th International …, 2021 - ieeexplore.ieee.org
SQL Injection is one of the most popular cyberattacks in which hackers can gain
unauthorized access to sensitive data such as customer information, trade secrets, etc. SQL …

Towards dynamic capture-the-flag training environments for reinforcement learning offensive security agents

RA Chetwyn, L Erdődi - … Conference on Big Data (Big Data), 2022 - ieeexplore.ieee.org
In this paper, we propose a formalised process for the generation of dynamically generated
SQL queries that are vulnerable to SQL injection attacks for the training of reinforcement …

[PDF][PDF] 'Detection of SQL injection attacks using machine learning in cloud computing platform

JM Alkhathami, SM Alzahrani - J. Theor. Appl. Inf. Technol, 2022 - jatit.org
The cloud computing holds a massive quantity of private and secret data and information, It
uses the internet to communicate with another party so it contain a number of unreliable …

Mitigation from SQL Injection Attacks on Web Server using Open Web Application Security Project Framework

A Fadlil, I Riadi, MA Mu'min - International Journal of Engineering, 2024 - ije.ir
SQL injection (SQLi) is one of the most common attacks against database servers and has
the potential to threaten server services by utilizing SQL commands to change, delete, or …

Beyond the Basics: A Study of Advanced Techniques for Detecting and Preventing SQL Injection Attacks

A Goyal, P Matta - 2023 4th International Conference on Smart …, 2023 - ieeexplore.ieee.org
Attacks using SQL (Structured Query Language) injection pose a serious risk to the
confidentiality and integrity of databases and web applications. Although tried-and-true …

An Overview of Malware Injection Attacks: Techniques, Impacts, and Countermeasures

R Madhvan, MF Zolkipli - Borneo International Journal eISSN 2636 …, 2023 - majmuah.com
With continuous advancement of technology, the frequency of malware injection attacks has
risen, posing significant risks to the security of computer systems and networks. This …