Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SQL
biblio
PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings
Submitted by aekwall on Mon, 04/20/2020 - 9:31am
Loss measurement
privacy models and measurement
relational database management systems
querying behaviour
quantitative measure
privacy-loss score
PriDe measure
N-gram model
interactive querying settings
Electronic Privacy
behavioural profiles
data privacy
Urban areas
Analytical models
SQL query
SQL
Databases
query processing
Metrics
privacy
pubcrawl
Data models
biblio
Automated Combinatorial Testing for Detecting SQL Vulnerabilities in Web Applications
Submitted by grigby1 on Mon, 02/10/2020 - 10:27am
privacy
web applications
tools
Syntactics
SQL vulnerabilities detection
SQL injection vulnerabilities
SQL injection
SQL detection
SQL database backend
SQL
security testing
security of data
Resiliency
resilience
pubcrawl
program testing
attack grammars
policy-based governance
Metrics
internet
Human behavior
gray-box testing method
gray-box testing
Grammar
Databases
concrete attack vectors
combinatorial testing methodology
combinatorial testing
collaboration
automated SQL injection vulnerability testing
automated combinatorial testing
biblio
Automatic Whitelist Generation for SQL Queries Using Web Application Tests
Submitted by grigby1 on Mon, 02/10/2020 - 10:26am
severe vulnerability issue
query patterns
query processing
Registers
relational databases
relational database security
research and development
resilience
Resiliency
security of data
query detection
SQL
SQL detection
SQL injection
SQL queries
Web application test
Web application tests
Whitelist
Whitelists
development process
automated generation
Automatic testing
automatic whitelist generation
blacklisting
collaboration
composability
confidential information
Database Security
Databases
application-specific implementations
Human behavior
internet
large-scale Web applications
legitimate queries
Metrics
policy-based governance
privacy
pubcrawl
biblio
Research on SQL Injection Attack and Prevention Technology Based on Web
Submitted by grigby1 on Mon, 02/10/2020 - 10:25am
Prevention Technology
Web
user input data legitimacy
Structured Query Language
SQL injection attack
SQL injection
SQL detection
SQL
Servers
security of data
Resiliency
resilience
query processing
pubcrawl
privacy
application security risks
policy-based governance
Metrics
injection attack
Information filters
Human behavior
Databases
database security protection technology
database security attack
database query code
database management systems
Data protection
component
collaboration
B/S mode application development
biblio
Evaluation of SQL Injection Prevention Methods
Submitted by grigby1 on Mon, 02/10/2020 - 10:25am
security of data
websites
web services
web applications
SQL Injection Prevention Methods
SQL injection prevention
SQL injection issue
SQL injection
SQL detection
SQL
collaboration
Resiliency
resilience
pubcrawl
privacy
policy-based governance
Metrics
internet
Human behavior
evaluation
biblio
Detecting SQL Injection Attacks Using Grammar Pattern Recognition and Access Behavior Mining
Submitted by grigby1 on Mon, 02/10/2020 - 10:25am
SQL
policy-based governance
privacy
pubcrawl
resilience
Resiliency
security
security of data
security risks
Pattern recognition
SQL detection
SQL injection
SQL injection attack
SQL Injection attacks
Support vector machines
Web access log
Web access logs
web applications
grammars
ATTAR
Clustering algorithms
collaboration
Data mining
Databases
feature extraction
Grammar
grammar pattern recognition
access behavior mining
Human behavior
internet
learning (artificial intelligence)
machine learning
machine learning algorithm
machine learning algorithms
Metrics
biblio
SQL-Identifier Injection Attacks
Submitted by grigby1 on Mon, 02/10/2020 - 10:25am
prepared-statement API
SQL-identifier injection attacks
SQL-ID IAs
SQL statements
SQL injection
SQL detection
SQL
software reliability
software maintenance
security of data
Resiliency
resilience
pubcrawl
privacy
automated analysis
policy-based governance
Metrics
Java
injecting identifiers
Human behavior
health care
GitHub
electronic medical record software
electronic health records
confidential patient information
collaboration
code vulnerability
biblio
Enhanced Automated-Scripting Method for Improved Management of SQL Injection Penetration Tests on a Large Scale
Submitted by grigby1 on Mon, 02/10/2020 - 10:24am
resilience
SQLiAutoScript method
SQLi penetration tests
SQL injection test
SQL injection penetration tests
SQL injection
SQL detection
SQL
security of data
Resiliency
collaboration
pubcrawl
program testing
privacy
policy-based governance
penetration tests
Metrics
large-scale SQL injections
Human behavior
enhanced automated-scripting method
biblio
Intrusion Detection Using Swarm Intelligence
Submitted by aekwall on Mon, 01/27/2020 - 9:26am
random neural network based system
mean squared error
multilayer perceptrons
Neural networks
Neurons
NSL-KDD
NSL-KDD Train
particle swarm optimization
Prediction algorithms
pubcrawl
mean square error methods
recurrent neural nets
Recurrent neural networks
RNN-ABC
sensitive information
SQL
SQL injection
Swarm Intelligence
Training
hybrid multilayer perceptron based intrusion detection system
Artificial Bee Colony
artificial bee colony algorithm
Biological neural networks
communication technologies
composability
Compositionality
computer network security
Cyber Attacks
Denial-of-Service
anomaly-based intrusion detection scheme
insecure channel
Internet of Things
Internet-of-Things devices
Intrusion Detection
IoT device
IoT security
learning (artificial intelligence)
man-in-middle
biblio
Sensitivity Analysis of SQL Queries
Submitted by grigby1 on Wed, 12/11/2019 - 11:23am
composability
differential privacy
pubcrawl
Sensitivity
SQL
« first
‹ previous
1
2
3
4
5
next ›
last »