نتایج جستجو برای: vulnerability detection

تعداد نتایج: 606748  

2012
Atefeh Tajpour Suhaimi Ibrahim Mohammad Sharifi

SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality. Researchers have proposed different tools to detect and prevent this vulnerability...

Journal: :Multiagent and Grid Systems 2006
Youcef Derbal

Fault detection and propagation in a computational grid requires a comprehensive framework that takes in consideration the various grid environmental conditions such as the asynchronous nature of communication and the uncertainty on the disseminated fault information. The paper presents a fault-tolerance framework that provides the necessary models to manage the local faulty behavior associated...

2017

The main aim of this paper was to develop and evaluate securely web-based application for construction material testing using object-oriented technology and parameterized queries for SQL command queries. The SQL queries for the web application of construction material testing were modified by adjusting their codes which included connection strings, authorization bypass and execute commands. Det...

2006
William H. King Robert F. Mills Michael R. Grimaila

Trusted employees pose a major threat to information systems. Despite advances in prevention, detection, and response techniques, the number of malicious insider incidents and their associated costs have yet to decline. There are very few vulnerability and impact models capable of providing information owners with the ability to comprehensively assess the effectiveness an organization’s malicio...

Journal: :Microprocessors and Microsystems - Embedded Hardware Design 1998
Stefanos Gritzalis Diomidis Spinellis

The Cascade Vulnerability Problem is a potential problem which must be faced when using the interconnected accredited system approach of the Trusted Network Interpretation. It belongs to a subset of the problem set that addresses the issue of whether the interconnection of secure systems via a secure channel results in a secure distributed system. The Cascade Vulnerability problem appears when ...

Journal: :Arteriosclerosis, thrombosis, and vascular biology 2013
Brigit den Adel Mat J Daemen Robert E Poelmann Louise van der Weerd

Recent advances in molecular resonance imaging of atherosclerosis enable to visualize atherosclerotic plaques in vivo using molecular targeted contrast agents. This offers opportunities to study atherosclerosis development and plaque vulnerability noninvasively. In this review, we discuss MRI contrast agents targeted toward atherosclerotic plaques and illustrate how these new imaging platforms ...

2002
M. T. Tyree J. S. Sperry

WATER RELATIONS AND THE VULNERABLE PIPELINE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 EARLY EFFORTS TO DETECT CAVITATION AND EMBOLISM . . . . . . . . . . . . . . . . . . . . . 21 ACOUSTIC DETECTION OF CAVITATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Audio (Low-Frequency) Detection . . . . . . . . . . . . . . . ....

2015
A. Umamaheswari B. Kalaavathi

Intrusions are the activities that violate the security policy of system. Shared broadcast radio channel, insecure operational environment, lack of central authority, lack of association, limited resource availability and physical vulnerability are the important issues in MANET. Intrusion Detection is the process used to identify intrusions. Intrusion detection system provides three important s...

Journal: :Human factors 2016
Casey Inez Canfield Baruch Fischhoff Alex Davis

OBJECTIVE We use signal detection theory to measure vulnerability to phishing attacks, including variation in performance across task conditions. BACKGROUND Phishing attacks are difficult to prevent with technology alone, as long as technology is operated by people. Those responsible for managing security risks must understand user decision making in order to create and evaluate potential sol...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید