Systematic review analysis on SQLIA detection and prevention approaches

MS Aliero, KN Qureshi, MF Pasha, I Ghani… - Wireless Personal …, 2020 - Springer
SQL injection attack (SQLIA) is one of the most severe attacks that can be used against web
database driving applications. Attackers use SQLIA to get unauthorized access and perform …

An empirical comparison of commercial and open‐source web vulnerability scanners

R Amankwah, J Chen, PK Kudjo… - Software: Practice and …, 2020 - Wiley Online Library
Web vulnerability scanners (WVSs) are tools that can detect security vulnerabilities in web
services. Although both commercial and open‐source WVSs exist, their vulnerability …

[PDF][PDF] SQL injection attacks countermeasures assessments

M Alenezi, M Nadeem, R Asif - Indonesian Journal of Electrical …, 2021 - researchgate.net
SQL injections attacks have been rated as the most dangerous vulnerability of web-based
systems over more than a decade by OWASP top ten. Though different static, runtime and …

Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher

I Riadi, A Fadlil, FA Tsani - JISKA (Jurnal Informatika Sunan …, 2022 - ejournal.uin-suka.ac.id
Kriptografi merupakan salah satu metode populer dalam pengamanan data dengan cara
membuat data sulit atau bahkan tidak bisa dibaca. Salah satu teknik atau algoritma yang …

Security Challenges of Blockchain-Based Supply Chain Systems

S Ismail, H Reza - 2022 IEEE 13th Annual Ubiquitous …, 2022 - ieeexplore.ieee.org
Blockchain has revolutionized supply chain system security, especially with Internet of
Things integration. Deploying blockchain in the supply chain incorporates immutability …

Spam Detection Techniques Recapped

S Kishore, M Awad, A Al-Zubidy - … International Conference on …, 2022 - ieeexplore.ieee.org
This paper examines the modern defensive measures that deal with the global spam traffic
over the Internet. Much of the review consists of cross-referencing recently published …

[PDF][PDF] A novel key exchange algorithm for security in internet of things

K Suresh, PP Reddy, P Preethi - Indones. J. Electr. Eng …, 2019 - pdfs.semanticscholar.org
Today Internet of things (IoT) interconnects any object possessing sensing and computing
capabilities to the internet. In this era, increasing number of electronic devices and …

[PDF][PDF] A decentralized consensus application using blockchain ecosystem

C Pujari, B Muniyal, CB Chandrakala - International Journal of …, 2020 - academia.edu
The consensus is a critical operation of any decision-making process. It involves a set of
eligible members; whose decision need to be honored by taking their acknowledgment …

Security of web applications: Threats, vulnerabilities, and protection methods

A Mohammed, J Alkhathami, H Alsuwat… - International journal of …, 2021 - kiss.kstudy.com
This is the world of computer science and innovations. In this modern era, every day new
apps, webs and software are being introduced. As well as new apps and software are being …

Reducing Web Application Programming Interface Vulnerabilities through a Functional Programming Artifact

M Piscatello - 2022 - search.proquest.com
Web application programming interfaces (APIs) security breaches frequently involve
exploiting injection vulnerabilities introduced by weaknesses in the coding style, and …