Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SQL detection
biblio
A Machine Learning Based Approach to Identify SQL Injection Vulnerabilities
Submitted by grigby1 on Mon, 02/10/2020 - 11:27am
collaboration
deep learning
Human behavior
Metrics
policy-based governance
prediction model
privacy
pubcrawl
resilience
Resiliency
SQL detection
SQL injection
Vulnerability
biblio
Automated Combinatorial Testing for Detecting SQL Vulnerabilities in Web Applications
Submitted by grigby1 on Mon, 02/10/2020 - 11:27am
privacy
web applications
tools
Syntactics
SQL vulnerabilities detection
SQL injection vulnerabilities
SQL injection
SQL detection
SQL database backend
SQL
security testing
security of data
Resiliency
resilience
pubcrawl
program testing
attack grammars
policy-based governance
Metrics
internet
Human behavior
gray-box testing method
gray-box testing
Grammar
Databases
concrete attack vectors
combinatorial testing methodology
combinatorial testing
collaboration
automated SQL injection vulnerability testing
automated combinatorial testing
biblio
Automatic Whitelist Generation for SQL Queries Using Web Application Tests
Submitted by grigby1 on Mon, 02/10/2020 - 11:26am
severe vulnerability issue
query patterns
query processing
Registers
relational databases
relational database security
research and development
resilience
Resiliency
security of data
query detection
SQL
SQL detection
SQL injection
SQL queries
Web application test
Web application tests
Whitelist
Whitelists
development process
automated generation
Automatic testing
automatic whitelist generation
blacklisting
collaboration
composability
confidential information
Database Security
Databases
application-specific implementations
Human behavior
internet
large-scale Web applications
legitimate queries
Metrics
policy-based governance
privacy
pubcrawl
biblio
Research on SQL Injection Attack and Prevention Technology Based on Web
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
Prevention Technology
Web
user input data legitimacy
Structured Query Language
SQL injection attack
SQL injection
SQL detection
SQL
Servers
security of data
Resiliency
resilience
query processing
pubcrawl
privacy
application security risks
policy-based governance
Metrics
injection attack
Information filters
Human behavior
Databases
database security protection technology
database security attack
database query code
database management systems
Data protection
component
collaboration
B/S mode application development
biblio
A CNN-Based Approach to the Detection of SQL Injection Attacks
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
CNN
collaboration
Human behavior
Metrics
ModSecurity
policy-based governance
privacy
pubcrawl
resilience
Resiliency
SQL detection
SQL injection
biblio
Evaluation of SQL Injection Prevention Methods
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
security of data
websites
web services
web applications
SQL Injection Prevention Methods
SQL injection prevention
SQL injection issue
SQL injection
SQL detection
SQL
collaboration
Resiliency
resilience
pubcrawl
privacy
policy-based governance
Metrics
internet
Human behavior
evaluation
biblio
Detection of SQL Injection Attacks: A Machine Learning Approach
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
classifiers
collaboration
Database application
Database Security
Human behavior
machine learning
Metrics
policy-based governance
privacy
pubcrawl
resilience
Resiliency
SQL detection
SQL injection
biblio
Detecting SQL Injection Attacks Using Grammar Pattern Recognition and Access Behavior Mining
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
SQL
policy-based governance
privacy
pubcrawl
resilience
Resiliency
security
security of data
security risks
Pattern recognition
SQL detection
SQL injection
SQL injection attack
SQL Injection attacks
Support vector machines
Web access log
Web access logs
web applications
grammars
ATTAR
Clustering algorithms
collaboration
Data mining
Databases
feature extraction
Grammar
grammar pattern recognition
access behavior mining
Human behavior
internet
learning (artificial intelligence)
machine learning
machine learning algorithm
machine learning algorithms
Metrics
biblio
SQL-Identifier Injection Attacks
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
prepared-statement API
SQL-identifier injection attacks
SQL-ID IAs
SQL statements
SQL injection
SQL detection
SQL
software reliability
software maintenance
security of data
Resiliency
resilience
pubcrawl
privacy
automated analysis
policy-based governance
Metrics
Java
injecting identifiers
Human behavior
health care
GitHub
electronic medical record software
electronic health records
confidential patient information
collaboration
code vulnerability
biblio
Method For Generating Test Data For Detecting SQL Injection Vulnerability in Web Application
Submitted by grigby1 on Mon, 02/10/2020 - 11:24am
collaboration
Human behavior
Metrics
policy-based governance
privacy
pubcrawl
resilience
Resiliency
security testing
SQL detection
SQL injection
SQL Injection vulnerability
Test Data Generation
1
2
next ›
last »