نتایج جستجو برای: vulnerability detection
تعداد نتایج: 606748 فیلتر نتایج به سال:
SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality. Researchers have proposed different tools to detect and prevent this vulnerability...
Fault detection and propagation in a computational grid requires a comprehensive framework that takes in consideration the various grid environmental conditions such as the asynchronous nature of communication and the uncertainty on the disseminated fault information. The paper presents a fault-tolerance framework that provides the necessary models to manage the local faulty behavior associated...
The main aim of this paper was to develop and evaluate securely web-based application for construction material testing using object-oriented technology and parameterized queries for SQL command queries. The SQL queries for the web application of construction material testing were modified by adjusting their codes which included connection strings, authorization bypass and execute commands. Det...
Trusted employees pose a major threat to information systems. Despite advances in prevention, detection, and response techniques, the number of malicious insider incidents and their associated costs have yet to decline. There are very few vulnerability and impact models capable of providing information owners with the ability to comprehensively assess the effectiveness an organization’s malicio...
The Cascade Vulnerability Problem is a potential problem which must be faced when using the interconnected accredited system approach of the Trusted Network Interpretation. It belongs to a subset of the problem set that addresses the issue of whether the interconnection of secure systems via a secure channel results in a secure distributed system. The Cascade Vulnerability problem appears when ...
Recent advances in molecular resonance imaging of atherosclerosis enable to visualize atherosclerotic plaques in vivo using molecular targeted contrast agents. This offers opportunities to study atherosclerosis development and plaque vulnerability noninvasively. In this review, we discuss MRI contrast agents targeted toward atherosclerotic plaques and illustrate how these new imaging platforms ...
WATER RELATIONS AND THE VULNERABLE PIPELINE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 EARLY EFFORTS TO DETECT CAVITATION AND EMBOLISM . . . . . . . . . . . . . . . . . . . . . 21 ACOUSTIC DETECTION OF CAVITATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Audio (Low-Frequency) Detection . . . . . . . . . . . . . . . ....
Intrusions are the activities that violate the security policy of system. Shared broadcast radio channel, insecure operational environment, lack of central authority, lack of association, limited resource availability and physical vulnerability are the important issues in MANET. Intrusion Detection is the process used to identify intrusions. Intrusion detection system provides three important s...
OBJECTIVE We use signal detection theory to measure vulnerability to phishing attacks, including variation in performance across task conditions. BACKGROUND Phishing attacks are difficult to prevent with technology alone, as long as technology is operated by people. Those responsible for managing security risks must understand user decision making in order to create and evaluate potential sol...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید