[HTML][HTML] Provably throttling SQLI using an enciphering query and secure matching

MA Hussain, ZA Hussien, ZA Abduljabbar, J Ma… - Egyptian Informatics …, 2022 - Elsevier
Web applications, which dominate the internet, act as communication media between
customers and service providers. Web applications are an internet innovation that provide …

A SQL injection detection method based on adaptive deep forest

Q Li, W Li, J Wang, M Cheng - IEEE Access, 2019 - ieeexplore.ieee.org
Injection attack is the first of the top 10 security threats announced by the OWASP.
Meanwhile, SQL injection is one of the most important types among the injection attacks …

A design approach to IoT endpoint security for production machinery monitoring

S Tedeschi, C Emmanouilidis, J Mehnen, R Roy - Sensors, 2019 - mdpi.com
The Internet of Things (IoT) has significant potential in upgrading legacy production
machinery with monitoring capabilities to unlock new capabilities and bring economic …

Performance analysis of mobile 4G/LTE networks

F Krasniqi, A Maraj, E Blaka - 2018 South-Eastern European …, 2018 - ieeexplore.ieee.org
Today, the biggest challenge for MNOs (Mobile Network Operators) is to provide broadband
services with high performance. The fourth generation mobile network (4G/LTE) has been …

Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website

B Wiguna, WA Prabowo… - Digital Zone: Jurnal …, 2020 - pustaka-psm.unilak.ac.id
Dalam beberapa tahun terakhir perkembangan teknologi informasi menjadi semakin pesat,
perkembangan ini membuat segala aktifitas dan pekerjaan menjadi lebih mudah, seperti …

Defending against sql injection attacks in web applications using machine learning and natural language processing

B Gogoi, T Ahmed, A Dutta - 2021 IEEE 18th India Council …, 2021 - ieeexplore.ieee.org
Today, most organizations use web applications for the delivery of services over the Internet.
The risks to web applications have increased as their use has risen. SQL Injection Attack is a …

A novel approach exploiting machine learning to detect SQLi attacks

AA Ashlam, A Badii, F Stahl - 2022 5th International …, 2022 - ieeexplore.ieee.org
The increasing use of Information Technology applications in the distributed environment is
increasing security exploits. Information about vulnerabilities is also available on the open …

Security testing for web applications: A Systematic Literature Review

ADJ Domínguez-García, X Limón… - 2023 11th …, 2023 - ieeexplore.ieee.org
As the use of the Internet grows, the number and relevance of web applications have also
grown, being an integral part of many sectors and businesses. However this growth has …

The impact of the security mechanisms in the throughput of the WLAN networks

S Lepaja, A Maraj, I Efendiu… - 2018 7th Mediterranean …, 2018 - ieeexplore.ieee.org
Wireless Local Area Network (WLAN) is the fastest growing technology in the
telecommunications industry. The huge increase in the use of this technology has provided …

A COMPARISON OF PASSWORD PROTECTION METHODS FOR WEB-BASED PLATFORMS IMPLEMENTED WITH PHP AND MYSQL.

N Katrandzhiev, D Hristozov… - International Journal on …, 2019 - search.ebscohost.com
The paper explains the need for using up-to-date security methods in order to protect some
of the most sensitive information in every system: user passwords. MD5, SHA1, bcrypt and …