A Survey on Cyber–Physical Systems Security
Cyber–physical systems (CPSs) are new types of intelligent systems that integrate
computing, control, and communication technologies, bridging the cyberspace and physical …
computing, control, and communication technologies, bridging the cyberspace and physical …
Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles
Cutting-edge technologies have been widely employed in healthcare delivery, resulting in
transformative advances and promising enhanced patient care, operational efficiency, and …
transformative advances and promising enhanced patient care, operational efficiency, and …
Detection and prevention of SQLI attacks and develo** compressive framework using machine learning and hybrid techniques
A web application is a software system that provides an interface to its users through a web
browser on any operating system (OS). Despite their growing popularity, web application …
browser on any operating system (OS). Despite their growing popularity, web application …
[HTML][HTML] SQL injection attack: Detection, prioritization & prevention
Web applications have become central in the digital landscape, providing users instant
access to information and allowing businesses to expand their reach. Injection attacks, such …
access to information and allowing businesses to expand their reach. Injection attacks, such …
AE-Net: Novel Autoencoder-Based Deep Features for SQL Injection Attack Detection
Structured Query Language (SQL) injection attacks represent a critical threat to database-
driven applications and systems, exploiting vulnerabilities in input fields to inject malicious …
driven applications and systems, exploiting vulnerabilities in input fields to inject malicious …
A study of NoSQL query injection in Neo4j
D Van Landuyt, V Wijshoff, W Joosen - Computers & Security, 2024 - Elsevier
Query injection refers to a class of attack types that involve the insertion of maliciously
crafted query parameters in database query operations, and/or API calls. Although these …
crafted query parameters in database query operations, and/or API calls. Although these …
Blockchain or AI: Web Applications Security Mitigations
Given the rapid advancement of web applications and the increasing importance of web
security, it is crucial to prioritize web security as a fundamental aspect of ensuring a secure …
security, it is crucial to prioritize web security as a fundamental aspect of ensuring a secure …
Kejahatan Siber Terhadap Individu: Jenis, Analisis, Dan Perkembangannya
R Butarbutar - Technology and Economics Law Journal, 2023 - scholarhub.ui.ac.id
Penelitian ini membahas kejahatan siber terhadap individu, jenis kejahatan siber, analisis,
dan perkembangannya. Penelitian ini menggunakan penelitian interdispliner dengan …
dan perkembangannya. Penelitian ini menggunakan penelitian interdispliner dengan …
[PDF][PDF] Sql injection attack detection using machine learning algorithm
T Muhammad, H Ghafory - Mesopotamian journal of cybersecurity, 2022 - iasj.net
The structured query language injection attack (SQLIA) is a well-known cyberattack targeting
vulnerabilities in web-based applications; it is used to carry out illegal information control …
vulnerabilities in web-based applications; it is used to carry out illegal information control …
PROGESI: a PROxy Grammar to Enhance web application firewall for SQL Injection prevention
A web application is prone to security threats due to its open nature. The security of these
platforms is imperative for organizations of all sizes because they store sensitive information …
platforms is imperative for organizations of all sizes because they store sensitive information …