Q Li, W Li, J Wang, M Cheng - IEEE Access, 2019 - ieeexplore.ieee.org
Injection attack is the first of the top 10 security threats announced by the OWASP. Meanwhile, SQL injection is one of the most important types among the injection attacks …
The Internet of Things (IoT) has significant potential in upgrading legacy production machinery with monitoring capabilities to unlock new capabilities and bring economic …
F Krasniqi, A Maraj, E Blaka - 2018 South-Eastern European …, 2018 - ieeexplore.ieee.org
Today, the biggest challenge for MNOs (Mobile Network Operators) is to provide broadband services with high performance. The fourth generation mobile network (4G/LTE) has been …
B Wiguna, WA Prabowo… - Digital Zone: Jurnal …, 2020 - pustaka-psm.unilak.ac.id
Dalam beberapa tahun terakhir perkembangan teknologi informasi menjadi semakin pesat, perkembangan ini membuat segala aktifitas dan pekerjaan menjadi lebih mudah, seperti …
B Gogoi, T Ahmed, A Dutta - 2021 IEEE 18th India Council …, 2021 - ieeexplore.ieee.org
Today, most organizations use web applications for the delivery of services over the Internet. The risks to web applications have increased as their use has risen. SQL Injection Attack is a …
AA Ashlam, A Badii, F Stahl - 2022 5th International …, 2022 - ieeexplore.ieee.org
The increasing use of Information Technology applications in the distributed environment is increasing security exploits. Information about vulnerabilities is also available on the open …
As the use of the Internet grows, the number and relevance of web applications have also grown, being an integral part of many sectors and businesses. However this growth has …
S Lepaja, A Maraj, I Efendiu… - 2018 7th Mediterranean …, 2018 - ieeexplore.ieee.org
Wireless Local Area Network (WLAN) is the fastest growing technology in the telecommunications industry. The huge increase in the use of this technology has provided …
N Katrandzhiev, D Hristozov… - International Journal on …, 2019 - search.ebscohost.com
The paper explains the need for using up-to-date security methods in order to protect some of the most sensitive information in every system: user passwords. MD5, SHA1, bcrypt and …