نتایج جستجو برای: sqli
تعداد نتایج: 25 فیلتر نتایج به سال:
With the emergence and popularity of web application, threats related to web applications has increased to large extent. Among many other web applications threats Structured Query Language Injection Attack (SQLIA) is the dominant in its use due to its ability to access the data. Many solutions are proposed in this regard that has success in specific conditions. The proposed model is based on th...
BACKGROUND Skeletally immature patients diagnosed with adolescent idiopathic scoliosis (AIS) and a Cobb angle above 25degrees is usually treated with a brace. Standard protocols in many centers include hospitalisation for a few days for the purpose of brace adaptation and fitting. The aim of this study is to compare compliance and satisfaction in hospitalization and out patient clinic protocols...
In this paper, we apply a well-known measure from information theory domain called Kullback-Leibler distance (or divergence) (KLD) to detect the symptoms of code injection attacks early during programme runtime. We take advantage of the observation that during code injection attack, the intended structure deviates from the expected structure. The KLD can be a suitable measure to capture the dev...
Abstract A web application is a software system that provides an interface to its users through browser on any operating (OS). Despite their growing popularity, security threats have become more diverse, resulting in severe damage. Malware attacks, particularly SQLI are common poorly designed applications. This vulnerability has been known for than two decades and still source of concern. Accor...
Unified Modeling Language (UML) activity diagrams are derived from use case diagrams. It becomes essential to incorporate security features and maintain consistency in the during analysis phase of Software Development Life Cycle (SDLC). As part current software development practices, must be a constant effort. The used model business process. detailed diagram is done. challenge lies viewing mai...
SQLI (SQL Injection) and XSS are hacking techniques that often used by hackers. This technique can find out the contents of database inserting a script on website. be threat if website does not have security ward off such attacks. Hackers will look for loopholes using this in login menu, searching, upload input menu URLs parameters ending numbers, but all websites attacked use you don't limit c...
With the Internet’s meteoric rise in popularity and usage over years, there has been a significant increase number of web applications. Nearly all organisations use them for various purposes, such as e-commerce, e-banking, e-learning, social networking. More importantly, applications have become increasingly vulnerable to malicious attack. To find vulnerabilities before an attacker, security ex...
SQL injection attacks are often found within the dynamic pages of a web application that exploit the security vulnerability of the database layers of an application. In this attack category a specifically crafted SQL command is entered in the form field of a web application instead of the expected information. SQL injection takes advantages of the design flaws in poorly designed web application...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید