SQL Injection: A sample review

S Mukherjee, P Sen, S Bora… - 2015 6th International …, 2015 - ieeexplore.ieee.org
In today's world, SQL Injection is a serious security threat over the Internet for the various
dynamic web applications residing over the internet. These Web applications conduct many …

MCAD: a machine learning based cyberattacks detector in software-defined networking (SDN) for healthcare systems

LM Halman, MJF Alenazi - IEEE Access, 2023 - ieeexplore.ieee.org
The healthcare sector deals with sensitive and significant data that must be protected
against illegitimate users. Software-defined networks (SDNs) are widely used in healthcare …

On the vulnerabilities of text-to-sql models

X Peng, Y Zhang, J Yang… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
Although it has been demonstrated that Natural Language Processing (NLP) algorithms are
vulnerable to deliberate attacks, the question of whether such weaknesses can lead to …

Web Based Database Security in Internet of Things Using Fully Homomorphic Encryption and Discrete Bee Colony Optimization

RJS Raj, MV Prakash, T Prince, K Shankar… - Malaysian Journal of …, 2020 - mojc.um.edu.my
Web applications are utilized on an extensive scale across the globe and it handles
sensitive individual information of users. Structured Query Language (SQL) Data Inference …

[HTML][HTML] Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age

AI Jony, SA Hamim - Journal of Information Technology and …, 2023 - jurnal.untag-sby.ac.id
In this contemporary digital age, cybersecurity stands as a crucial linchpin amid the
expanding role of technology in our lives, encountering numerous challenges. This review …

On the security vulnerabilities of text-to-sql models

X Peng, Y Zhang, J Yang, M Stevenson - arXiv preprint arXiv:2211.15363, 2022 - arxiv.org
Although it has been demonstrated that Natural Language Processing (NLP) algorithms are
vulnerable to deliberate attacks, the question of whether such weaknesses can lead to …

Securing passwords from dictionary attack with character-tree

J Jose, TT Tomy, V Karunakaran… - 2016 International …, 2016 - ieeexplore.ieee.org
Most websites use passwords for authenticating user identity and for allowing access to
website resources that may contain sensitive information. A large number of people use …

MobSTer: A model‐based security testing framework for web applications

M Peroli, F De Meo, L Viganò… - … Testing, Verification and …, 2018 - Wiley Online Library
Web applications have become one of the preferred means for users to perform a number of
crucial and security‐sensitive operations such as selling and buying goods or managing …

[HTML][HTML] Securing password using dynamic password policy generator algorithm

A Singh, S Raj - Journal of King Saud University-Computer and …, 2022 - Elsevier
It is proposed to tackle the problem of password leakage of popular websites like Linked-In,
Adobe, Gmail, Yahoo, eHarmony, etc. by using dynamic password policy and enhanced …

Building an IT Security Laboratory for Complex Teaching Scenarios Using 'Infrastructure as Code'

M Soll, H Helmken, M Belde… - 2023 IEEE Global …, 2023 - ieeexplore.ieee.org
There are increasing demands for IT security education which could be partly met by easier
access to IT security laboratories. This paper proposes the use of 'Infrastructure as …