Detection of sql injection attack using machine learning techniques: a systematic literature review

M Alghawazi, D Alghazzawi, S Alarifi - Journal of Cybersecurity and …, 2022 - mdpi.com
An SQL injection attack, usually occur when the attacker (s) modify, delete, read, and copy
data from database servers and are among the most damaging of web application attacks. A …

Enforcing security in Internet of Things frameworks: A systematic literature review

M Aly, F Khomh, M Haoues, A Quintero, S Yacout - Internet of Things, 2019 - Elsevier
With the rise of the Internet of Things (IoT) technology, the number of IoT devices/sensors
has increased significantly. It is anticipated that large-scale sensor-based systems will …

A comprehensive study of security of internet-of-things

A Mosenia, NK Jha - IEEE Transactions on emerging topics in …, 2016 - ieeexplore.ieee.org
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a
transformative approach for providing numerous services. Compact smart devices constitute …

Phosphor: Illuminating dynamic data flow in commodity jvms

J Bell, G Kaiser - ACM Sigplan Notices, 2014 - dl.acm.org
Dynamic taint analysis is a well-known information flow analysis problem with many
possible applications. Taint tracking allows for analysis of application data flow by assigning …

Web application protection techniques: A taxonomy

V Prokhorenko, KKR Choo, H Ashman - Journal of Network and Computer …, 2016 - Elsevier
The growing popularity of web applications makes them an attractive target for malicious
users. Large amounts of private data commonly processed and stored by web applications …

Saphire: Sandboxing {PHP} applications with tailored system call allowlists

A Bulekov, R Jahanshahi, M Egele - 30th USENIX Security Symposium …, 2021 - usenix.org
Interpreted languages, such as PHP, power a host of platform-independent applications,
including websites, instant messengers, video games, and development environments. With …

Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques

WB Demilie, FG Deriba - Journal of Big Data, 2022 - Springer
A web application is a software system that provides an interface to its users through a web
browser on any operating system (OS). Despite their growing popularity, web application …

Real time MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information

A Shahzad, M Lee, YK Lee, S Kim, N Xiong, JY Choi… - Symmetry, 2015 - mdpi.com
Information technology (IT) security has become a major concern due to the growing
demand for information and massive development of client/server applications for various …

NoSQL injection attack detection in web applications using RESTful service

AM Eassa, M Elhoseny, HM El-Bakry… - … and Computer Software, 2018 - Springer
Despite the extensive research of using web services for security purposes, there is a big
challenge towards finding a no radical solution for NoSQL injection attack. This paper …

Defending against web application attacks: Approaches, challenges and implications

D Mitropoulos, P Louridas… - … on Dependable and …, 2017 - ieeexplore.ieee.org
Some of the most dangerous web attacks, such as Cross-Site Scripting and sql injection,
exploit vulnerabilities in web applications that may accept and process data of uncertain …