Serviceeinschränkungen vom 12.-22.02.2026 - weitere Infos auf der UB-Homepage

Treffer 81 - 100 von 566

81

Cat Swarm Optimization to Cybersecurity and GANs-based Defence Solutions Enhancement.
Marulli, Fiammetta ; Paganini, Pierluigi ; Lancellotti, Fabio
In Procedia Computer Science 2025 270:5977-5984

Fachzeitschrift
Zu den Favoriten
82

Research on the Technology of Detecting the SQL Injection Attack and Non-Intrusive Prevention in WEB System.
Haibin Hu
AIP Conference Proceedings. 2017, Vol. 1839 Issue 1, p1-8. 8p. 2 Diagrams, 2 Charts.

SQL INTERNET security COMPUTER security INFORMATION technology s... INTERNET safety
Konferenz
Zu den Favoriten
83

A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords.
Saadi, Zena Mohammad ; Sadiq, Ahmed T. ; Akif, Omar Z. ; et al.
Electronics (2079-9292); Aug2024, Vol. 13 Issue 15, p3042, 30p

SOCIAL engineering (Frau... COMPUTER vision CYBERTERRORISM REVERSE engineering COMPUTER passwords
Fachzeitschrift
Zu den Favoriten
84

security threats and vulnerabilities in food delivery web applications : mitigation strategies
Usha shete
International Journal on Science and Technology. 16

Fachzeitschrift
Zu den Favoriten
85

Research on Network Security Threat Identification and Defence Strategies Based on Big Data Models
Tianyu Li
Journal of Combinatorial Mathematics and Combinatorial Computing. 123:325-342

Fachzeitschrift
Zu den Favoriten
86

Overview of Web Security Attacks.
Biswas, Sucharith ; Chaitanya ; Sai, K. Bhuvan ; et al.
International Scientific Journal of Engineering & Management; Apr2025, Vol. 4 Issue 4, p1-7, 7p

CYBERTERRORISM SECURITY systems SQL FORGERY
Fachzeitschrift
Zu den Favoriten
87

SQL Injection Techniques and Mitigation Strategies: a study using OWASP Mutillidae II
Boateng, Forster

Cybersecurity fi=Tietojenkäsittely|sv=... databases SQL query languages data protection
Dissertation
Zu den Favoriten
88

An Innovative Security Strategy using Reactive Web Application Honeypot
Gupta, Rajat ; V., Madhu Viswanatham ; K, Manikandan

Computer Science - Crypt...
Report
Zu den Favoriten
89

THE ROLE OF CAPTURE-THE-FLAG (CTF) CHALLENGES IN CYBERSECURITY RESEARCH AND TRAINING: ANALYSIS OF THE “EDITORIAL” MACHINE.
Vasylenko, Volodymyr ; Grynkevych, Ganna ; Kuznietsov, Illia
Cybersecurity: Education, Science, Technique / Kiberbezpeka: Osvita, Nauka, Tekhnika; 2025, Vol. 28 Issue 4, p137-149, 13p

CAREER development COMPUTER network securit... INTERNET security SQL RECONNAISSANCE operation...
Fachzeitschrift
Zu den Favoriten
90

SQL Injection Attack Detection Using Machine Learning Algorithm.
Muhammad, Taseer ; Ghafory, Hamayoon
Mesopotamian Journal of CyberSecurity; 2022, Vol. 2022, p5-18, 14p

INTERNET security MACHINE learning ALGORITHMS PUBLICATIONS INFORMATION retrieval
Fachzeitschrift
Zu den Favoriten
92

review of SQLI detection strategies using machine learning
Biswajit Mondal ; Abhijit Banerjee ; Subir Gupta
International journal of health sciences. :9663-9676

0202 electrical engineer... 02 engineering and techn...
Fachzeitschrift
Zu den Favoriten
93

Penyusunan Modul Praktikum SQL Injeksi di SMK Negeri 5 Takengon
Amanatus Syarifah ; Mulkan Fadhli
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI). 7

Fachzeitschrift
Zu den Favoriten
94

SQLshield: Preventing SQL Injection Attacks by Modifying User Input Data
Jigar Sharda ; Punit Mehta ; Manik Lal Das
Lecture Notes in Computer Science ISBN: 9783319269603

16. Peace & justice 3. Good health
Buch
Zu den Favoriten
95

Dieses Ergebnis kann Gästen nicht angezeigt werden.

96

SQL Injection: Analysis of Penetration Testing Effectiveness in Web Applications: SQL Injection: Analisis Efektivitas Uji Penetrasi dalam Aplikasi Web
Nugraha, Luthfi Arian ; Kautsar, Irwan Alnarus

Cybersecurity SQL Injection Penetration Testing Web Vulnerability
Report
Zu den Favoriten
97

Understanding Query Vulnerabilities for Various SQL Injection Techniques
Digvijay Singh ; U. Chandrasekhar
Advances in Intelligent Systems and Computing ISBN: 9788132216643

Buch
Zu den Favoriten
98

Extracting Optimal Number of Features for Machine Learning Models in Multilayer IoT Attacks.
Sukhni, Badeea Al ; Manna, Soumya K. ; Dave, Jugal M. ; et al.
Sensors (14248220); Dec2024, Vol. 24 Issue 24, p8121, 31p

MACHINE learning FEATURE selection K-nearest neighbor class... INTERNET of things SQL
Fachzeitschrift
Zu den Favoriten
99

MIDPS: A Multi-agent Host Intrusion Detection and Prevention System
El Jaouhari, Saad ; Vavilov, Andrei ; Soloveva, Julia ; et al.
International Conference on Advanced Information Networking and Applications (AINA). :257-268

Prevention Ban Detection Attacks Security Web application
Zeitschrift
Zu den Favoriten
100

A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks
Biringa, Chidera ; Kul, Gökhan

Computer Science - Crypt...
Report
Zu den Favoriten

Filter