A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things

S Khanam, IB Ahmedy, MYI Idris, MH Jaward… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) facilitates the integration between objects and different sensors to
provide communication among them without human intervention. However, the extensive …

Machine learning techniques for software vulnerability prediction: a comparative study

G Jabeen, S Rahim, W Afzal, D Khan, AA Khan… - Applied …, 2022 - Springer
Software vulnerabilities represent a major cause of security problems. Various vulnerability
discovery models (VDMs) attempt to model the rate at which the vulnerabilities are …

Detecting sql injection attack using natural language processing

S Lakhani, A Yadav, V Singh - 2022 IEEE 9th Uttar Pradesh …, 2022 - ieeexplore.ieee.org
In today's digital era, online attacks are increasing in number and are becoming severe day
by day, especially those related to web applications. The data accessible over the web …

SQL injection attack detection using ResNet

S Nagasundari, PB Honnavali - 2019 10th International …, 2019 - ieeexplore.ieee.org
SQL Injection being the top web vulnerabilities, is defined as a code injection technique to
gain access over sensitive data. According to OWASP-2017, it is recorded as one of the top …

CodeSAGE: A multi-feature fusion vulnerability detection approach using code attribute graphs and attention mechanisms

G Zhang, T Yao, J Qin, Y Li, Q Ma, D Sun - Journal of Information Security …, 2025 - Elsevier
Software supply chain security is a critical aspect of modern computer security, with
vulnerabilities being a significant threats. Identifying and patching these vulnerabilities …

A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs

Y Liu, Z Liu, X Liu, W Guo - Ieee Transactions on Emerging …, 2022 - ieeexplore.ieee.org
In this article, we propose a web back-end database leakage incident reconstruction
framework (WeB-DLIR) over unlabeled logs, designed to improve the intelligence and …

Software Vulnerabilities Detection Based on a Pre-trained Language Model

W Xu, T Li, J Wang, H Duan… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
Software vulnerabilities detection is crucial in cyber security which protects the software
systems from malicious attacks. The majority of earlier techniques relied on security …

A unified measurable software trustworthy model based on vulnerability loss speed index

G Jabeen, L Ping - … Conference On Trust, Security And Privacy …, 2019 - ieeexplore.ieee.org
As trust becomes increasingly important in the software domain. Due to its complex
composite concept, people face great challenges, especially in today's dynamic and …

Software vulnerability prediction using deep learning on the unbalanced datasets

W Rhmann, A Ishrat, J Khan… - … Intelligence Applications in …, 2024 - taylorfrancis.com
Any software flaw exposes the system to risk and makes it easier for hackers to access
resources without authorization. Software product engineers can better utilize their …

SQLi ve XSS Saldırı Tespitinde Kullanılan Yeni Bir Özellik Çıkarma Yöntemi

MS Erçin, E Yolaçan - Uluslararası Bilgi Güvenliği Mühendisliği …, 2022 - dergipark.org.tr
Web sayfalarına erişmek için kullanılan adres satırı veya web sayfalarında ve
uygulamalarında bulunan formlar gibi kullanıcıdan girdi alabildiğimiz, dolayısıyla …