RA Chetwyn, L Erdődi - … Conference on Big Data (Big Data), 2022 - ieeexplore.ieee.org
In this paper, we propose a formalised process for the generation of dynamically generated SQL queries that are vulnerable to SQL injection attacks for the training of reinforcement …
M Riegler, J Sametinger, C Schönegger - International Conference on …, 2022 - Springer
Many devices in various domains operate in different modes. We have suggested to use mode switching for security purposes to make systems more resilient when vulnerabilities …
H Bahruddin, V Suryani, AA Wardana - Proceedings of SAI Intelligent …, 2023 - Springer
This research proposed adversary simulation for Structured Query Language (SQL) injection attacks using the genetic algorithm to bypass Web Application Firewalls (WAF). SQL …