Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SQL injection attack
biblio
Diverse Approaches Have Been Presented To Mitigate SQL Injection Attack, But It Is Still Alive: A Review
Submitted by grigby1 on Thu, 05/11/2023 - 3:47pm
malicious code
SQLIA
SQL injection attack
review
Resiliency
Mobile Security
command injection attacks
web security
Government
SQL injection
Market research
machine learning
Cybersecurity
Vulnerability
Structured Query Language
application security
Data Security
composability
Companies
resilience
Metrics
pubcrawl
biblio
SQL Injection Attack and Detection Based on GreenSQL Pattern Input Whitelist
Submitted by grigby1 on Mon, 03/15/2021 - 12:08pm
Resiliency
internet technology
IP networks
Metrics
optimized whitelist
Pattern
patterned input
pubcrawl
resilience
internet
SQL
SQL injection
SQL injection attack
SQL injection attack command
Whitelist
Whitelists
working mode
Big Data
intercept samples
input model
Information systems
GreenSQL pattern input whitelist
GreenSQL learning
GreenSQL database firewall
GreenSQL
Firewalls (computing)
firewalls
Databases
database protection
database management systems
dangerous threat
composability
command injection attacks
biblio
Data Security in cloud computing using Hierarchical CP-ABE scheme with scalability and flexibility
Submitted by grigby1 on Fri, 07/24/2020 - 11:49am
fine grained access control
SQL injection attack
SQL injection
scalable access control
Scalability
quality of service
pubcrawl
policy-based governance
Organizations
KP-ABE
key policy attribute based encryption
hierarchical CP-ABE scheme
Hierarchical CP-ABE
Attribute key
encryption
Data Security
Cryptography
CP-ABE
collaboration
cloud service provider
Cloud Computing
CipherText Policy Attribute Based Encryption
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorization mechanisms
authorization
authorisation
biblio
Impact of SQL Injection in Database Security
Submitted by aekwall on Mon, 04/20/2020 - 9:44am
public key cryptography
world web applications
hybrid encryption
Elliptical Curve Cryptography
database information
dangerous hacking technique
cracking technique
Database Security
AES
relational database security
ECC
relational databases
Elliptic curve cryptography
authorisation
SQL injection attack
SQL
Databases
SQL injection
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
advanced encryption standard
encryption
biblio
Research on SQL Injection Attack and Prevention Technology Based on Web
Submitted by grigby1 on Mon, 02/10/2020 - 10:25am
Prevention Technology
Web
user input data legitimacy
Structured Query Language
SQL injection attack
SQL injection
SQL detection
SQL
Servers
security of data
Resiliency
resilience
query processing
pubcrawl
privacy
application security risks
policy-based governance
Metrics
injection attack
Information filters
Human behavior
Databases
database security protection technology
database security attack
database query code
database management systems
Data protection
component
collaboration
B/S mode application development
biblio
Detecting SQL Injection Attacks Using Grammar Pattern Recognition and Access Behavior Mining
Submitted by grigby1 on Mon, 02/10/2020 - 10:25am
SQL
policy-based governance
privacy
pubcrawl
resilience
Resiliency
security
security of data
security risks
Pattern recognition
SQL detection
SQL injection
SQL injection attack
SQL Injection attacks
Support vector machines
Web access log
Web access logs
web applications
grammars
ATTAR
Clustering algorithms
collaboration
Data mining
Databases
feature extraction
Grammar
grammar pattern recognition
access behavior mining
Human behavior
internet
learning (artificial intelligence)
machine learning
machine learning algorithm
machine learning algorithms
Metrics
biblio
Blockchain-Based Mutual Authentication Security Protocol for Distributed RFID Systems
Submitted by grigby1 on Wed, 10/02/2019 - 2:03pm
potential attacks
Supply Chain
SQL injection attack
SQL
Servers
security
RFIDs
RFID
Resiliency
resilience
radiofrequency identification
radio frequency identification technology
pubcrawl
Protocols
privacy
access control system
identity related information
Human Factors
Human behavior
high security demand
distributed system
distributed RFID systems
distributed environment
Cryptographic Protocols
credit card
Computers
blockchain-based mutual authentication security protocol
blockchain
authorisation
authentication
biblio
A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning
Submitted by aekwall on Mon, 02/25/2019 - 10:39am
privacy
website connected database
Web sites
vulnerabilities
tools
threats
SQL injection attack
SQL injection
SQL
specific website
Servers
retrieving sensitive information
Resiliency
real-world implementation
query processing
pubcrawl
actual website
preventive measures
policy-based-governance
open source tools
Metrics
Linux
invasive software
Human behavior
foundational cybersecurity course
executing SQL queries
enhanced cybersecurity learning
Databases
Crawlers
computer science education
Computer hacking
Acunetix
biblio
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
SQL injection attack
pubcrawl
receiver operating characteristic curve
Resiliency
ROC curve
secure backend storage
security
security of data
smart devices
SQL
SQL injection
privacy
SQLIA
SQLIA big data
SQLIA Data analytics
SQLIA hashing
SQLIA Pattern-driven data set
Structured Query Language
structured query language injection attack
supervised learning
supervised learning model
Support vector machines
IoT
back-end database
Big Data
Cloud Computing
cloud-hosted Web applications
collaboration
confidential data
Data mining
Data models
Human behavior
Internet of Things
Artificial Intelligence
learning (artificial intelligence)
learning automata
Microsoft Azure Machine Learning
ML algorithms
pattern classification
pattern-driven corpus
Policy
policy-based governance
Policy-Governed Secure Collaboration
Predictive Analytics
biblio
A hybrid method for detection and prevention of SQL injection attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:13pm
serious security threat
Policy-Governed Secure Collaboration
Prevention
privacy
pubcrawl
Resiliency
Runtime
security of data
sensitive information
policy-based governance
Servers
SQL
SQL injection
SQL injection attack
SQL statements
SQLIA
static
web applications
detection
collaboration
common gateway interface
Computer hacking
Data mining
database design
database driven web applications
database management systems
Databases
access content
dynamic
Hacker
Human behavior
hybrid method
hybrid SQLIA
internet
Policy
1
2
next ›
last »