Search Results - Dataset SQL injection Anomaly detection
-
1
Authors: et al.
Contributors: et al.
Subject Terms: SQL injection, Dataset SQL injection Anomaly detection, Anomaly detection, [INFO] Computer Science [cs], SQL Injection Detection Dataset, Dataset
File Description: application/pdf
Access URL: https://hal.science/hal-05314211v1
-
2
Authors:
Source: Journal of Cyber Security & Risk Auditing; 2025, Vol. 2025 Issue 4, p347-365, 19p
-
3
Authors:
Source: International Research Journal of Innovations in Engineering & Technology; 2025 Special Issue, Vol. 9, p228-244, 7p
Subject Terms: SECURITY systems, ANOMALY detection (Computer security), SQL, WEB design, CYBERTERRORISM
-
4
Authors:
Source: AIP Conference Proceedings. 2025, Vol. 3318 Issue 1, p1-13. 13p.
-
5
Authors:
Source: Data (2306-5729); Nov2025, Vol. 10 Issue 11, p186, 11p
-
6
Authors:
Source: مجلة الشرق للعلوم الإنسانية; مجلد 1 عدد 5 (2025): عدد خاص لمؤتمر ICETMF25، كلية مزون، سلطنة عمان; 58-67 ; East Journal of Human Science; Vol. 1 No. 5 (2025): Special Issue for ICETMF25, Mazoon College, Oman; 58-67 ; 3079-9384
Subject Terms: NoSQL databases, Machine Learning, Machine Learning Anomaly Detection, Database Security, SQL Injection, Big Data, Internet of Things (IoT)
File Description: application/pdf
Relation: https://eastpublication.com/index.php/ejhs/article/view/156/68; https://eastpublication.com/index.php/ejhs/article/view/156
-
7
Authors: et al.
Source: Journal of Robotics & Control (JRC); 2025, Vol. 6 Issue 3, p1316-1331, 16p
-
8
Authors: et al.
Source: Sensors (14248220); 3/15/2024, Vol. 24 Issue 6, p1-32, 32p, 1 Diagram, 5 Charts, 2 Graphs
-
9
Authors: Thangaraju, Vigneshwaran
Source: International Research Journal of Innovations in Engineering & Technology; Mar2025, Vol. 9 Issue 3, p205-212, 8p
-
10
Authors:
Source: ICTACT Journal on Communication Technology. 16:3677-3685
-
11
Authors: Atassi, Reem
Source: Fusion: Practice & Applications; 2023, Vol. 13 Issue 1, p126-134, 9p
-
12
Authors:
Source: Journal of Cyber Security and Risk Auditing. 2025:347-365
-
13
Authors: et al.
Index Terms: Article, PeerReviewed
-
14
Authors:
Source: Malaysian Journal of Science, Health & Technology; 2024, Vol. 10 Issue 1, p39-49, 11p
-
15
Authors: et al.
Source: JOIV: International Journal on Informatics Visualization, Vol 8, Iss 4, Pp 2131-2138 (2024)
Subject Terms: sql injection, machine learning, artificial intelligence, cybersecurity, sql injection attack, Computer software, QA76.75-76.765
File Description: electronic resource
-
16
Authors:
Source: International Journal of Science and Research Archive. 13:2839-2909
-
17
Authors:
Source: ISeCure; Winter/Spring 2020, Vol. 12 Issue 1, p44-54, 11p
Subject Terms: ANOMALY detection (Computer security), SQL, UNIFORM Resource Locators, MACHINE learning, WEBSITES
-
18
Authors:
Source: 2007 IEEE International Performance, Computing, and Communications Conference. :449-458
Subject Terms: SQL, validity, query, databases, applications, Life Sciences, 02 engineering and technology, anomaly detection, Engineering, Medicine and Health Sciences, Physical Sciences and Mathematics, 0202 electrical engineering, electronic engineering, information engineering, malicious behaviour
Access URL: http://doi.ieeecomputersociety.org/10.1109/PCCC.2007.358926
https://docs.lib.purdue.edu/ccpubs/287/
https://dblp.uni-trier.de/db/conf/ipccc/ipccc2007.html#BertinoKE07
https://ci.nii.ac.jp/naid/10028098425/
http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000004197962
https://ieeexplore.ieee.org/document/4197962/ -
19
Authors: Jawad, Ali Muayad1 ameerfayz2532@gmail.com
Source: Journal of Computational Analysis & Applications. 2025, Vol. 34 Issue 8, p329-342. 14p.
-
20
Authors: et al.
Source: TPM: Testing, Psychometrics, Methodology in Applied Psychology; 2025 Supplement, Vol. 32, p356-370, 15p
Nájsť tento článok vo Web of Science
Full Text Finder