Serviceeinschränkungen vom 12.-22.02.2026 - weitere Infos auf der UB-Homepage

Treffer 101 - 120 von 565

101

A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks
Biringa, Chidera ; Kul, Gökhan

Computer Science - Crypt...
Report
Zu den Favoriten
102

A Multiagent Based Strategy for Detecting Attacks in Databases in a Distributed Mode
Pinzón Trejos, Cristian ; De Paz, Yanira ; Bajo, Javier

Multi-agent SQL injection Security database case-based reasoning IDS
Fachzeitschrift
Zu den Favoriten
103

Performance Comparison of Multiple Classification Models used for Detection of SQL Injection Attacks
Abebe, Anduamlak ; Belay, Yonas ; Belay, Adane ; et al.
Ethiopian International Journal of Engineering and Technology ; Vol. 2 No. 1 (2024): EIJET; 22 - 38 ; 2959-3921 ; 2959-393X

Fachzeitschrift
Zu den Favoriten
104

Securing Against Advanced Cyber Threats: A Comprehensive Guide to Phishing, XSS, and SQL Injection Defense
Nair, S. S. (Sunil)
Journal of Computer Science and Technology Studies

Indonesia
Fachzeitschrift
Zu den Favoriten
105

Enhancing Security in Industrial Application Development: Case Study on Self-Generating Artificial Intelligence Tools.
Mateo Sanguino, Tomás de J.
Applied Sciences (2076-3417); May2024, Vol. 14 Issue 9, p3780, 18p

COMPUTER Emergency Respo... ARTIFICIAL intelligence INDUSTRIALIZATION SOFTWARE development too... DATABASES INDUSTRIAL security
Fachzeitschrift
Zu den Favoriten
106

Topology-Controlled Chirality and Spin Selectivity in Two-Dimensional Covalent Organic Frameworks
Jiang, Chao ; Jin, Chuanyu ; Lv, Yao ; et al.
Journal of the American Chemical Society. 148(2):2551-2562

Fachzeitschrift
Zu den Favoriten
107

A review of SQLI detection strategies using machine learning
Mondal, Biswajit ; Banerjee, Abhijit ; Gupta, Subir
International journal of health sciences; Special Issue II; 9664-9677 ; 2550-696X ; 2550-6978 ; 10.53730/ijhs.v6nS2.2022

SQL injection MLP support vector machine logistic regression naive Bayes decision tree
Fachzeitschrift
Zu den Favoriten
108

Securing trustworthy big data: Comprehensive overview of challenges and Enhanced security with machine learning and blockchain.
Hamdaoui, Ikram ; Makkaoui, Khalid El ; El Allali, Zakaria ; et al.
Information Security Journal: A Global Perspective. Jan2026, p1-35. 35p. 13 Illustrations.

BIG data MACHINE learning DATA protection CONFIDENTIALITY agreemen... DATA integrity BLOCKCHAINS
Fachzeitschrift
Zu den Favoriten
109

ЕКСПЕРИМЕНТИ ТА ПРАКТИЧНІ РІШЕННЯ ПОБУДОВИ ТЕСТОВОГО СЕРЕДОВИЩА ДЛЯ ПЕРЕВІРКИ РІВНЯ БЕЗПЕКИ НА РІВНІ ДОДАТКІВ (Ukrainian)
Скуратовський Євгеній Олегович ; Аносов Андрій Олександрович ; Стрельніков Віталій Ігорович ; et al.
Cybersecurity: Education, Science, Technique / Kiberbezpeka: Osvita, Nauka, Tekhnika; 2025, Vol. 3 Issue 31, p217-226, 10p

INTERNET security COMPUTER software securi... PENETRATION testing (Com... VIRTUAL machine systems RISK assessment SIMULATION software
Fachzeitschrift
Zu den Favoriten
110

A Survey: Security Vulnerabilities and Protective Strategies for Graphical Passwords
Zena Mohammad Saadi ; Ahmed T. Sadiq ; Omar Z. Akif ; et al.
Electronics. 13:3042

0202 electrical engineer... 02 engineering and techn...
Fachzeitschrift
Zu den Favoriten
111

A Thirty-Day Dataset of Malicious HTTP Requests Blocked by OWASP ModSecurity on a Production Web Server.
Lucz, Geza ; Forstner, Bertalan
Data (2306-5729); Nov2025, Vol. 10 Issue 11, p186, 11p

INTRUSION detection syst... INTERNET security DATA security failures COMPUTER network securit...
Fachzeitschrift
Zu den Favoriten
112

Vulnerabilities of Web Applications: Good Practices and New Trends.
Nawrocki, Mateusz
Applied Cybersecurity & Internet Governance (ACIG); 2024, Vol. 3 Issue 2, p122-143, 22p

WEB-based user interface... ACCESS control WEB services BEST practices SQL CYBERTERRORISM
Fachzeitschrift
Zu den Favoriten
113

Analysing and Mitigating Vulnerabilities in a Metasploitable Environment
Topalovic, Edvin ; Glave, Valentino ; Topalovic, Edvin ; et al.

E-Ressource
Zu den Favoriten
114

Ensemble Machine Learning Approaches for Detection of SQL Injection Attack
Umar Farooq
Tehnički Glasnik, Vol 15, Iss 1, Pp 112-120 (2021)

Boosting ensemble learning Light GBM SQL injection web security Technology
Fachzeitschrift
Zu den Favoriten
115

Knowledge Base Model for Security Audits inWeb Services with SQL Injection ; Modelo base de conocimiento para auditorías de seguridad en servicios web con inyección SQL
Moreno Marín, John Edison ; Coronado Sánchez, Paulo Cesar
Ingeniería; Vol. 25 No. 3 (2020): September - December; 264-283 ; Ingeniería; Vol. 25 Núm. 3 (2020): Septiembre - Diciembre; 264-283 ; 2344-8393 ; 0121-750X

Modelo de información seguridad de la informac... seguridad informática servicios web auditoría de aplicacione... inyección SQL
Fachzeitschrift
Zu den Favoriten
116

Penetration Testing of Agentic AI: A Comparative Security Analysis Across Models and Frameworks
Nguyen, Viet K. ; Husain, Mohammad I.

Cryptography and Securit... Artificial Intelligence
Report
Zu den Favoriten
117
118

Evaluating the Efficacy of Automated Penetration Testing Tools in Identifying Vulnerabilities in Modern Web Applications
null Fawaz A. Mereani, Emad Shafie
Journal of Information Systems Engineering and Management. 10:1540-1548

Fachzeitschrift
Zu den Favoriten
119

Strategi Keamanan Data dalam Database Relasional : Tinjauan Literatur
null Dwi Amanda Tanjung ; null Muhammad Irwan Padli Nasution
Jurnal Manajemen Bisnis Era Digital. 2:99-112

Fachzeitschrift
Zu den Favoriten
120

Filter