15   Artículos

 
en línea
Edwin Peralta-Garcia, Juan Quevedo-Monsalbe, Victor Tuesta-Monteza and Juan Arcila-Diaz    
Structured Query Language (SQL) injections pose a constant threat to web services, highlighting the need for efficient detection to address this vulnerability. This study compares machine learning algorithms for detecting SQL injections in web microservi... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma    
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injec... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hao Sun, Yuejin Du and Qi Li    
Amid the incessant evolution of the Internet, an array of cybersecurity threats has surged at an unprecedented rate. A notable antagonist within this plethora of attacks is the SQL injection assault, a prevalent form of Internet attack that poses a signi... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fahad M. Alotaibi and Vassilios G. Vassilakis    
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali and Noel Crespi    
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications. This mammoth rise in their usage has ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
?.?. Yudova,Olga R. Laponina     Pág. 61 - 68
This article is devoted to the analysis of the possibility of detecting attacks on web applications using machine learning algorithms. Supervised learning is considered. A sample of HTTP DATASET CSIC 2010 is used as a data set. The dataset was automatica... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Esteban Crespo-Martinez    
Databases are usually the main targets of an attack, specifically for the information that they store, since, according to Druker, information is power. In this work vulnerability tests are performed of the database of an ERP software developed in APEX 5... ver más
Revista: Ingenius. Revista de Ciencia y TecnologÍ­a    Formato: Electrónico

 
en línea
John Edison Moreno Marín, Paulo Cesar Coronado Sánchez    
ResumenDescargasReferenciasCómo citar
Revista: Ingeniería    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »