A systematic review of detection and prevention techniques of SQL injection attacks

M Nasereddin, A ALKhamaiseh… - … Security Journal: A …, 2023 - Taylor & Francis
ABSTRACT SQL injection is a type of database-targeted attack for data-driven applications.
It is performed by inserting malicious code in the SQL query to alter and modify its meaning …

A survey of detection methods for XSS attacks

U Sarmah, DK Bhattacharyya, JK Kalita - Journal of Network and Computer …, 2018 - Elsevier
Cross-site scripting attack (abbreviated as XSS) is an unremitting problem for the Web
applications since the early 2000s. It is a code injection attack on the client-side where an …

Privacy concerns in social media UGC communities: Understanding user behavior sentiments in complex networks

JR Saura, D Palacios-Marqués… - Information Systems and …, 2023 - Springer
In a digital ecosystem where large amounts of data related to user actions are generated
every day, important concerns have emerged about the collection, management, and …

Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

An improved ELM-based and data preprocessing integrated approach for phishing detection considering comprehensive features

L Yang, J Zhang, X Wang, Z Li, Z Li, Y He - Expert Systems with …, 2021 - Elsevier
In this paper, a novel approach based on non-inverse matrix online sequence extreme
learning machine (NIOSELM) for phishing detection is presented, which takes into account …

Predicting catastrophic events using machine learning models for natural language processing

M Chopra, SK Singh, K Aggarwal… - Data mining approaches …, 2022 - igi-global.com
In recent years, there has been widespread improvement in communication technologies.
Social media applications like Twitter have made it much easier for people to send and …

Adaptive and convex optimization-inspired workflow scheduling for cloud environment

K Lakhwani, G Sharma, R Sandhu… - International Journal of …, 2023 - igi-global.com
Scheduling large-scale and resource-intensive workflows in cloud infrastructure is one of the
main challenges for cloud service providers (CSPs). Cloud infrastructure is more efficient …

Ensure hierarchal identity based data security in cloud environment

S Kaushik, C Gandhi - Research Anthology on Blockchain …, 2021 - igi-global.com
Cloud computing has emerged as a new promising field in the internet. It can be thought as
a new architecture for the next generation of IT enterprises. It allows the user to access …

Efficiency and effectiveness of web application vulnerability detection approaches: A review

B Zhang, J Li, J Ren, G Huang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Most existing surveys and reviews on web application vulnerability detection (WAVD)
approaches focus on comparing and summarizing the approaches' technical details …

A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges

M Bhattacharya, S Roy, S Chattopadhyay… - Security and …, 2023 - Wiley Online Library
Over the past few years, online social networks (OSNs) have become an inseparable part of
people's daily lives. Instead of being passive readers, people are now enjoying their role as …