Journal articles on the topic 'SQL injection attack detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SQL injection attack detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mr., Vishal Andodariya. "SQL Injection Attack Detection and Prevention Techniques to Secure Web Site." International Journal of Trend in Scientific Research and Development 2, no. 4 (2019): 624–28. https://doi.org/10.31142/ijtsrd13034.
Full textSilva, Rui Filipe, Raul Barbosa, and Jorge Bernardino. "Intrusion Detection Systems for Mitigating SQL Injection Attacks." International Journal of Information Security and Privacy 14, no. 2 (2020): 20–40. http://dx.doi.org/10.4018/ijisp.2020040102.
Full textSenouci, Oussama, and Nadjib Benaouda. "Advanced deep learning framework for detecting SQL injection attacks based on GRU Model." STUDIES IN ENGINEERING AND EXACT SCIENCES 5, no. 2 (2024): e11299. https://doi.org/10.54021/seesv5n2-596.
Full textAlghawazi, Maha, Daniyal Alghazzawi, and Suaad Alarifi. "Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review." Journal of Cybersecurity and Privacy 2, no. 4 (2022): 764–77. http://dx.doi.org/10.3390/jcp2040039.
Full textHafriadi, Fajar Dzulnufrie, and Rizka Ardiansyah. "NETWORK'S ACCESS LOG CLASSIFICATION FOR DETECTING SQL INJECTION ATTACKS WITH THE LSTM ALGORITHM." Jurnal Teknik Informatika (Jutif) 5, no. 4 (2024): 745–52. https://doi.org/10.52436/1.jutif.2024.5.4.2157.
Full textAbebe, Anduamlak, Yonas Belay, Adane Belay, and Seffi Gebeyehu. "SQL INJECTION ATTACKS DETECTION: A PERFORMANCE COMPARISON ON MULTIPLE CLASSIFICATION MODELS." Ethiopian International Journal of Engineering and Technology 2, no. 1 (2024): 22–38. http://dx.doi.org/10.59122/154cfc15.
Full textDalai, Asish Kumar, and Sanjay Kumar Jena. "Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3825373.
Full textSiddiqa, Ayesha. "Web Based Intrusion Detection System for SQLIA." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 11 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26708.
Full textAbdulmalik, Yazeed. "An Improved SQL Injection Attack Detection Model Using Machine Learning Techniques." International Journal of Innovative Computing 11, no. 1 (2021): 53–57. http://dx.doi.org/10.11113/ijic.v11n1.300.
Full textKumar, Ashish, and Sumitra Binu. "Proposed Method for SQL Injection Detection and its Prevention." International Journal of Engineering & Technology 7, no. 2.6 (2018): 213. http://dx.doi.org/10.14419/ijet.v7i2.6.10569.
Full textAlarfaj, Fawaz Khaled, and Nayeem Ahmad Khan. "Enhancing the Performance of SQL Injection Attack Detection through Probabilistic Neural Networks." Applied Sciences 13, no. 7 (2023): 4365. http://dx.doi.org/10.3390/app13074365.
Full textJ. Santhosh Kumar, B., and P. P. Anaswara. "Vulnerability detection and prevention of SQL injection." International Journal of Engineering & Technology 7, no. 2.31 (2018): 16. http://dx.doi.org/10.14419/ijet.v7i2.31.13388.
Full textOchieng Okello, Fredrick. "A STUDY OF MACHINE LEARNING-BASED APPROACHES FOR SQL INJECTION DETECTION AND PREVENTION." International Journal of Advanced Research 13, no. 02 (2025): 1035–44. https://doi.org/10.21474/ijar01/20461.
Full textGuan, Yuting, Junjiang He, Tao Li, Hui Zhao, and Baoqiang Ma. "SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning." Future Internet 15, no. 4 (2023): 133. http://dx.doi.org/10.3390/fi15040133.
Full textAburashed, Laila, Marah AL Amoush, and Wardeh Alrefai. "SQL Injection Attack Detection using Machine Learning Algorithms." Semarak International Journal of Machine Learning 2, no. 1 (2024): 1–12. http://dx.doi.org/10.37934/sijml.2.1.112.
Full textAburashed, Laila, Marah AL Amoush, and Wardeh Alrefai. "SQL Injection Attack Detection using Machine Learning Algorithms." Semarak International Journal of Machine Learning 2, no. 1 (2025): 1–12. https://doi.org/10.37934/sijml.2.1.112a.
Full textChen, Zhuang, Min Guo, and Lin zhou. "Research on SQL injection detection technology based on SVM." MATEC Web of Conferences 173 (2018): 01004. http://dx.doi.org/10.1051/matecconf/201817301004.
Full textHossain, Shahriar, North Sarah, and Chen Wei-Chuen. "EARLY DETECTION OF SQL INJECTION ATTACKS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 53–65. https://doi.org/10.5281/zenodo.4451606.
Full textALAzzawi, Abdulbasit. "SQL Injection Detection Using RNN Deep Learning Model." Journal of Applied Engineering and Technological Science (JAETS) 5, no. 1 (2023): 531–41. http://dx.doi.org/10.37385/jaets.v5i1.2864.
Full textFahmi Al Azhar, Muhammad, and Ruki Harwahyu. "DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS." MULTITEK INDONESIA 17, no. 1 (2023): 69–78. http://dx.doi.org/10.24269/mtkind.v17i1.7267.
Full textLe, Thi-Thu-Huong, Yeonjeong Hwang, Changwoo Choi, Rini Wisnu Wardhani, Dedy Septono Catur Putranto, and Howon Kim . "Enhancing Structured Query Language Injection Detection with Trustworthy Ensemble Learning and Boosting Models Using Local Explanation Techniques." Electronics 13, no. 22 (2024): 4350. http://dx.doi.org/10.3390/electronics13224350.
Full textV, Saranya, and Havisha Monal A. "SQL Injection Attack Detection in Websites." ESP Journal of Engineering & Technology Advancements 2, no. 1 (2022): 5–11. http://dx.doi.org/10.56472/25832646/esp-v2i1p102.
Full textRawat, Romil, and Shailendra Kumar Shrivastav. "SQL injection attack Detection using SVM." International Journal of Computer Applications 42, no. 13 (2012): 1–4. http://dx.doi.org/10.5120/5749-7043.
Full textKusuma, Gregorius Hendy. "Analysis of SQL Injection Attacks on Website Service." bit-Tech 1, no. 1 (2018): 26–33. http://dx.doi.org/10.32877/bt.v1i1.3.
Full textSreeja, T., Dr Manna Sheela Rani Chetty, and Sekhar Babu Boddu. "Detecting SQL Injection Using Correlative Log Analysis." International Journal of Engineering & Technology 7, no. 2.32 (2018): 389. http://dx.doi.org/10.14419/ijet.v7i2.32.15720.
Full textArasteh, Bahman, Asgarali Bouyer, Seyed Salar Sefati, and Razvan Craciunescu. "Effective SQL Injection Detection: A Fusion of Binary Olympiad Optimizer and Classification Algorithm." Mathematics 12, no. 18 (2024): 2917. http://dx.doi.org/10.3390/math12182917.
Full textCahyadi, Nanang, Syifa Nurgaida Yutia, and Pietra Dorand. "Enhancing SQL Injection Attack Prevention: A Framework for Detection, Secure Development, and Intelligent Techniques." Journal of Informatics and Communication Technology (JICT) 5, no. 2 (2023): 138–48. http://dx.doi.org/10.52661/j_ict.v5i2.233.
Full textBhanu Pratap Singh and Prof. Manish Kumar Singhal. "Detection of SQL Injection Attack Using Machine Learning Techniques." International Journal of Scientific Research in Science and Technology 11, no. 6 (2024): 780–90. https://doi.org/10.32628/ijsrst24114323.
Full textLiu, Yixian, and Yupeng Dai. "Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection." IET Information Security 2024 (April 5, 2024): 1–16. http://dx.doi.org/10.1049/2024/5565950.
Full textKartheek, Pamarthi. "Investigation on SQL Injection Detection and Prevention Tools." Journal of Scientific and Engineering Research 8, no. 12 (2021): 271–80. https://doi.org/10.5281/zenodo.13347743.
Full textAugustine, Nwabudike, Abu Bakar Md. Sultan, Mohd Hafeez Osman, and Khaironi Yatim Sharif. "Application of Artificial Intelligence in Detecting SQL Injection Attacks." JOIV : International Journal on Informatics Visualization 8, no. 4 (2024): 2131. https://doi.org/10.62527/joiv.8.4.3631.
Full textPaul, Alan, Vishal Sharma, and Oluwafemi Olukoya. "SQL injection attack: Detection, prioritization & prevention." Journal of Information Security and Applications 85 (September 2024): 103871. http://dx.doi.org/10.1016/j.jisa.2024.103871.
Full textChen, Yizhang, Dan Wang, and Lihua Fu. "A detection model for SQL injection attack." International Journal of Collaborative Intelligence 1, no. 2 (2015): 137. http://dx.doi.org/10.1504/ijci.2015.071219.
Full textDas, Debasish, Utpal Sharma, and D. K. Bhattacharyya. "Rule based Detection of SQL Injection Attack." International Journal of Computer Applications 43, no. 19 (2012): 15–24. http://dx.doi.org/10.5120/6210-8812.
Full textAndodariya, Mr Vishal. "SQL Injection Attack Detection and Prevention Techniques to Secure Web-Site." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (2018): 624–28. http://dx.doi.org/10.31142/ijtsrd13034.
Full textLu, Dongzhe, Jinlong Fei, and Long Liu. "A Semantic Learning-Based SQL Injection Attack Detection Technology." Electronics 12, no. 6 (2023): 1344. http://dx.doi.org/10.3390/electronics12061344.
Full textКРАВЧУК, НАЗАР, та ТЕТЯНА КОРОБЕЙНІКОВА. "БЕЗПЕЧНИЙ ДОСТУП ДО СЕРВЕРІВ ІНФОРМАЦІЙНИХ СИСТЕМ, ЗАБЕЗПЕЧЕНИЙ ML-МОДЕЛЛЮ ДЛЯ БЛОКУВАННЯ ШКІДЛИВИХ ЗАПИТІВ". Herald of Khmelnytskyi National University. Technical sciences 341, № 5 (2024): 327–33. https://doi.org/10.31891/2307-5732-2024-341-5-48.
Full textB. Kalaiselvi, B. Kalaiselvi, Mannepalle Sai Chandu, Maridhu Narendra, and Mannepalle Deekshith Kumar. "SQL-Injection Vulnerability Scanning Tool for Automatic Creation of SQL-Injection Attacks." International Journal of Advances in Engineering and Management 7, no. 1 (2025): 577–87. https://doi.org/10.35629/5252-0701577587.
Full textGurina, Anastasia, and Vladimir Eliseev. "Anomaly-Based Method for Detecting Multiple Classes of Network Attacks." Information 10, no. 3 (2019): 84. http://dx.doi.org/10.3390/info10030084.
Full textSarajaldeen Akram Bahjat Arif. "The Implications for a Hybrid Detection Technique Against Malicious SQL Attacks on Web Applications." Journal of Information Systems Engineering and Management 10, no. 35s (2025): 1101–9. https://doi.org/10.52783/jisem.v10i35s.6219.
Full textZhao, Chunhui, Shuaijie Si, Tengfei Tu, Yijie Shi, and Sujuan Qin. "Deep-Learning Based Injection Attacks Detection Method for HTTP." Mathematics 10, no. 16 (2022): 2914. http://dx.doi.org/10.3390/math10162914.
Full textZhang, Xing Zhong, and Xiao Jie Zhang. "Discussion on the Detection and Prevention of SQL Injection." Advanced Materials Research 287-290 (July 2011): 3047–50. http://dx.doi.org/10.4028/www.scientific.net/amr.287-290.3047.
Full textAlenezi, Mamdouh, Muhammad Nadeem, and Raja Asif. "SQL injection attacks countermeasures assessments." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 1121–31. https://doi.org/10.11591/ijeecs.v21.i2.pp1121-1131.
Full textLaila, Bubaker, Yousef Aisha, and Algariani Walid. "A Systematic Mapping Study on Web services Security Threats, Vulnerabilities, and Countermeasures." AlQalam Journal of Medical and Applied Sciences 4, no. 1 (2021): 91–100. https://doi.org/10.5281/zenodo.4460572.
Full textPratama, Rakha Satria, Muhamad Irsan, and Rio Guntur Utomo. "ANALYZING COMPARISON PERFORMANCE MODEL OF MACHINE LEARNING THROUGH DETECTION SQL INJECTION ATTACK." JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 9, no. 4 (2024): 2064–73. https://doi.org/10.29100/jipi.v9i4.5637.
Full textMohammed A M Oudah and Mohd Fadzli Marhusin. "SQL Injection Detection using Machine Learning: A Review." Malaysian Journal of Science Health & Technology 10, no. 1 (2024): 39–49. http://dx.doi.org/10.33102/mjosht.v10i1.368.
Full textAblahd, Ann, and Suhair Dawwod. "Using Flask for SQLIA Detection and Protection." Tikrit Journal of Engineering Sciences 27, no. 2 (2020): 1–14. http://dx.doi.org/10.25130/tjes.27.2.01.
Full textFarooq, Umar. "Ensemble Machine Learning Approaches for Detection of SQL Injection Attack." Tehnički glasnik 15, no. 1 (2021): 112–20. http://dx.doi.org/10.31803/tg-20210205101347.
Full textOkello, Fredrick Ochieng, Dennis Kaburu, and Ndia G. John. "Automation-Based User Input Sql Injection Detection and Prevention Framework." Computer and Information Science 16, no. 2 (2023): 51. http://dx.doi.org/10.5539/cis.v16n2p51.
Full textMuhammad, Baihaqi Fatah, and Ihsan Cahyo Utomo. "Implementation of IDS Using Snort with Barnyard2 Visualization for Network Monitoring in The Informatics Engineering Computer Lab at Muhammadiyah University Surakarta." International Journal of Computer and Information System (IJCIS) 4, no. 4 (2023): 165–71. http://dx.doi.org/10.29040/ijcis.v4i4.142.
Full text