Multi-source data analysis and evaluation of machine learning techniques for SQL injection detection

K Ross, M Moh, TS Moh, J Yao - Proceedings of the ACMSE 2018 …, 2018 - dl.acm.org
SQL Injection continues to be one of the most damaging security exploits in terms of
personal information exposure as well as monetary loss. Injection attacks are the number …

A deep learning assisted personalized deception system for countering web application attacks

WB Shahid, B Aslam, H Abbas, H Afzal… - Journal of Information …, 2022 - Elsevier
Recent years have seen momentous growth in web attacks that has motivated researchers
to come up with sophisticated techniques to tackle them. Lately, there has been growing …

SQL injection detection using machine learning techniques and multiple data sources

K Ross - 2018 - scholarworks.sjsu.edu
SQL Injection continues to be one of the most damaging security exploits in terms of
personal information exposure as well as monetary loss. Injection attacks are the number …

[PDF][PDF] Image processing on raspberry Pi cluster

D Marković, D Vujičić, D Mitrović, S Ranđić - 2018 - doisrpska.nub.rs
Paper Title (use style: paper title) Page 1 International Journal of Electrical Engineering and
Computing Vol. 2, No. 2 (2018) 83 Case study UDC 634.711:632.6/.7:595.77 DOI 10.7251/IJEEC1802083M …

Vulnerability assessment and patching management

I Altaf, F ul Rashid, JA Dar… - … Conference on Soft …, 2015 - ieeexplore.ieee.org
This paper focuses on the vulnerabilities that may occur in any Web application and then
removing these vulnerabilities. A vulnerability assessment is the process of identifying …

Investigation of modern attacks using proxy honeypot

RE Mushtakov, DS Silnov… - … IEEE Conference of …, 2018 - ieeexplore.ieee.org
Open proxy server is the service in computer networks which allows any user on the Internet
to execute indirect requests to other network services. This technology can be used for …

[PDF][PDF] Pi-crust: a Raspberry Pi cluster implementation

E Wilcox, P Jhunjhunwala, K Gopavaram… - Texas A&M University …, 2015 - jorgehc.com
Raspberry Pi is revolutionizing the computing industry. Originally designed to provide low
cost computers to schools it quickly expanded far beyond that. With this inexpensive …

A Survey on SQL Injection Prevention Methods

SMH Chaki, MM Din - International Journal of Innovative Computing, 2019 - ijic.utm.my
Database plays a very important role in everyone’ s life including the organizations
since everything today is connected via Internet and to manage so many data. There is a …

Real-time traffic monitoring and SQL injection attack detection for edge networks

T Singh, B Aksanli - Proceedings of the 15th ACM International …, 2019 - dl.acm.org
Injection attacks are at the top of Open Web Application Security Project's Top 10 Application
Security Risks list almost every year. SQL Injection (SQLI) is one such attack that presents …

Research on Network Intrusion Detection Technology Based on Honeypot

F Dang, L Yan, Y Yang, S Li… - 2024 5th International …, 2024 - ieeexplore.ieee.org
With the development of the network, people are becoming more and more dependent on
the network for their work and lives, this makes the network environment complex. At the …