A survey on sql injection attack: Detection and challenges

Z Marashdeh, K Suwais, M Alia - … International Conference on …, 2021 - ieeexplore.ieee.org
Web applications are seen to play a vital role in the individual lives and even assist in the
economic development of the country. However, many security vulnerabilities have been …

A survey on vulnerability assessment & penetration testing for secure communication

K Patel - 2019 3rd International Conference on Trends in …, 2019 - ieeexplore.ieee.org
As the technology is growing rapidly, the development of systems and software are
becoming more complex. For this reason, the security of software and web applications …

A survey on SQL injection attacks, detection and prevention

J Hu, W Zhao, Y Cui - Proceedings of the 2020 12th International …, 2020 - dl.acm.org
Since the uses of Web in daily life is increasing in past 20 years and becoming trend now,
almost every Web application has its own database to store important data. An attacker can …

A survey on various security protocols of edge computing

T Bhattacharya, AV Peddi, S Ponaganti… - The Journal of …, 2025 - Springer
Edge computing has emerged as a transformative data processing method by decentralizing
computations and bringing them toward the data source, significantly reducing latency and …

SQL injection detection using machine learning

S Mishra - 2019 - scholarworks.sjsu.edu
Sharing information over the Internet over multiple platforms and web-applications has
become a quite common phenomenon in the recent times. The web-based applications that …

[PDF][PDF] Vulnerability Assessment Studies of Existing Knowledge-Based Authentication Systems: A Systematic Review

TC Adeniran, RG Jimoh, EU Abah… - … University Journal of …, 2024 - researchgate.net
In the past decades, web applications have become a vital part of our daily activities, while
hacking activities have also increased speedily. Both individuals and organizations are …

SQL injection vulnerability detection using deep learning: a feature-based approach

MM Hassan, RB Ahmad… - Indonesian Journal of …, 2021 - section.iaesonline.com
SQL injection (SQLi), a well-known exploitation technique, is a serious risk factor for
database-driven web applications that are used to manage the core business functions of …

Comparison study for NLP using machine learning techniques to detecting SQL injection vulnerabilities

MHA AL-Maliki, MN Jasim - International Journal of Nonlinear …, 2023 - ijnaa.semnan.ac.ir
Due to the vast number of electronic attacks that occur on a daily basis, protecting users'
data is extremely important in this age of technology. Nowadays, cyber security is regarded …

A survey on SQL injection attacks, detection and prevention techniques-a tertiary study

M Hallo, G Suntaxi - International Journal of Security and …, 2022 - inderscienceonline.com
This paper presents a tertiary systematic literature review of SQL injection attacks based on
previous secondary systematic literature reviews and systematic mappings. We identify the …

Countermeasure to structured query language injection attack for web applications using hybrid logistic regression technique

SM Shagari, D Gabi, NM Dankolo… - Journal of the Nigerian …, 2022 - journal.nsps.org.ng
The new generation of security threats has been promoted by real-time applications, where
several users develop new ways to communicate on the internet via web applications …