Výsledky vyhledávání - "SQL-injection"
-
1
Autoři:
Zdroj: Jurnal Teknologi dan Sistem Informasi, Vol 11, Iss 1 (2025)
Témata: SQL Injection, SQLMap, Electronic computers. Computer science, Burp Suite, Kerentanan Sistem, QA75.5-76.95, Penetration Testing
Přístupová URL adresa: https://doaj.org/article/dbbfe58ca00241aaa1be3f20c76ca2c2
-
2
Autoři: Ariwibowo, Bagus
Zdroj: Jurnal Aplikasi dan Teori Ilmu Komputer; Vol 7, No 2 (2024): September; 86-92
Popis souboru: application/pdf
Přístupová URL adresa: http://ejournal.upi.edu/index.php/JATIKOM/article/view/80971
-
3
Zdroj: Прикладна геометрія, інженерна графіка та об’єкти інтелектуальної власності; № XIV (2025): XIV Міжнародна науково-практична конференція Прикладна геометрія, інженерна графіка та об'єкти інтелектуальної власності; 83-86
Témata: кіберзахист, SQL Injection, MITM, DDoS
Popis souboru: application/pdf
Přístupová URL adresa: https://jagegip.kpi.ua/article/view/332472
-
4
Autoři:
Zdroj: Engineering and Technology Journal, Vol 43, Iss 10, Pp 822-834 (2025)
Témata: ai, driven attacks database security adversarial machine learning sql injection data poisoning federated learning security gan, based attacks, Science, Technology
Popis souboru: electronic resource
Relation: https://etj.uotechnology.edu.iq/article_189916_f8cf42093babd7723a99bdd99fc8b523.pdf; https://doaj.org/toc/1681-6900; https://doaj.org/toc/2412-0758
Přístupová URL adresa: https://doaj.org/article/6a94b2119c764d78b115ac268d991b47
-
5
Autoři: Haneen mohammed adhab Al salmawi
Zdroj: Wasit Journal for Pure Sciences, Vol 4, Iss 1 (2025)
Témata: SQL Injection, Agent-based Vulnerability Response System (AVRS), Machine Learning, Vulnerability Scanning, Malware Detection, Science
Přístupová URL adresa: https://doaj.org/article/571ee1810ce5400b8d3b48ec6bbc3d5c
-
6
Autoři: a další
Zdroj: Science Journal of University of Zakho, Vol 13, Iss 1 (2025)
Témata: SQL injection, Deep Learning, Science, XSS, CNN, Web vulnerabilities
Přístupová URL adresa: https://doaj.org/article/b4ecb0f01c644bcc818970d5f0a2da1e
-
7
Autoři: a další
Zdroj: IEEE Transactions on Information Forensics and Security. 20:6693-6705
Témata: Machine Learning, FOS: Computer and information sciences, Cryptography and Security, Cryptography and Security (cs.CR), Web application firewalls, machine learning, SQL injection, adversarial training, Machine Learning (cs.LG)
Popis souboru: application/pdf
-
8
Autoři:
Zdroj: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security. :1523-1538
Témata: FOS: Computer and information sciences, Computer Science - Cryptography and Security, PHUZZ, greybox fuzzing, remote command execution, PHP, web security, vulnerability discovery, SQL injection, fuzz testing, coverage-guided fuzzing, cross-site scripting, 000 Informatik, Informationswissenschaft, allgemeine Werke::000 Informatik, Wissen, Systeme::004 Datenverarbeitung, Informatik, Cryptography and Security (cs.CR)
Přístupová URL adresa: http://arxiv.org/abs/2406.06261
-
9
Enhanced SQL injection detection using chi-square feature selection and machine learning classifiers
Autoři:
Zdroj: Frontiers in Big Data, Vol 8 (2025)
Témata: cyberattacks, machine learning, feature selection, SQL injection, high-dimensional data, Information technology, T58.5-58.64
Popis souboru: electronic resource
Relation: https://www.frontiersin.org/articles/10.3389/fdata.2025.1686479/full; https://doaj.org/toc/2624-909X
Přístupová URL adresa: https://doaj.org/article/edf890e2e8d64c3b9c639e797f5febca
-
10
Autoři: a další
Přispěvatelé: a další
Témata: SQL injection, Dataset SQL injection Anomaly detection, Anomaly detection, [INFO] Computer Science [cs], SQL Injection Detection Dataset, Dataset
Popis souboru: application/pdf
Přístupová URL adresa: https://hal.science/hal-05314211v1
-
11
Autoři: a další
Zdroj: Lecture Notes in Networks and Systems ISBN: 9783031764585
Computer Science > Machine Learning
Lecture Notes in Networks and Systems, Distributed Computing and Artificial Intelligence, Special Sessions I, 21st International Conference
Lecture Notes in Networks and Systems
Lecture Notes in Networks and Systems-Distributed Computing and Artificial Intelligence, Special Sessions I, 21st International ConferenceTémata: FOS: Computer and information sciences, Computer Science - Machine Learning, Machine Learning, OWASP ModSecurity Core Rule Set, SQL injection, Web Application Firewalls, Web Security, Web Application Firewalls, Machine Learning, Web Security, SQL injection, OWASP ModSecurity Core Rule Set, Machine Learning (cs.LG)
-
12
Autoři: a další
Zdroj: World Journal of Advanced Research and Reviews. 23:451-465
-
13
Autoři:
Zdroj: Journal of Applied Informatics and Computing, Vol 8, Iss 1, Pp 194-202 (2024)
Témata: machine learning, sql injection, Electronic computers. Computer science, decision tree, QA75.5-76.95, random forest, database
Přístupová URL adresa: https://doaj.org/article/a35711357ee84918b8936a09130115e1
-
14
-
15
Autoři:
Zdroj: International Journal of Multidisciplinary and Innovative Research.
-
16
-
17
-
18
Autoři:
Zdroj: 48th ICT and Electronics Convention MIPRO 2025.
Přístupová URL adresa: https://docs.mipro-proceedings.com/sp/27_20106_sp.pdf
-
19
Autoři:
Zdroj: Journal of Internet and Software Engineering, Vol 6, Iss 1 (2025)
Témata: Website, SQL Injection, SQLMap, Havij, Ghauri, Computer engineering. Computer hardware, TK7885-7895, Electric apparatus and materials. Electric circuits. Electric networks, TK452-454.4
Popis souboru: electronic resource
Přístupová URL adresa: https://doaj.org/article/137283bf90f94b4bbd3b6dad9b86dc1c
-
20
Autoři:
Zdroj: ENVIRONMENT. TECHNOLOGY. RESOURCES. Proceedings of the International Scientific and Practical Conference; Vol. 4 (2024): Environment. Technology. Resources. Proceedings of the 15th International Scientific and Practical Conference. Volume 4; 144-149
ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference; Vol. 4 (2024): Environment. Technology. Resources. Proceedings of the 15th International Scientific and Practical Conference. Volume 4; 144-149Témata: behavioural analysis, information security, cross-site scripting (XSS), adaptability, SQL-injection, electronic resource, threat
Popis souboru: application/pdf
Nájsť tento článok vo Web of Science
Full Text Finder