Umfassende Service-Einschränkungen im Bereich Ausleihe ab 17. März!

Treffer 1 - 20 von 24

1

Exploitation of SQL Common Language Runtime Assemblies: A Novel Attack Vector for Compromising Microsoft SQL Server Environments
Narayan, Vedant ; Raj, Arpit ; Muskan, Vivek
2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT) Computing Communication and Networking Technologies (ICCCNT), 2024 15th International Conference on. :1-6 Jun, 2024

Konferenz
Zu den Favoriten
3

An Optimized Decentralized Trust Approach for Securing IoV Stream Data: A Smart Contract-Driven Framework
S, Balasubramani ; Kumar, Pamidi Trinesh ; Ganesh, Nukala Rohith
2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN) ICPCSN Pervasive Computing and Social Networking (ICPCSN), 2023 3rd International Conference on. :928-934 Jun, 2023

Konferenz
Zu den Favoriten
4

Legacy Software Made Tamper-Proof: A Case Study of Using HyperLedger Fabric in the Steel Industry
Samanipor, Ali ; Bushehrian, Omid ; Garnavi, Ali ; et al.
2025 International Conference on Smart Applications, Communications and Networking (SmartNets) Smart Applications, Communications and Networking (SmartNets), 2025 International Conference on. :1-5 Jul, 2025

Konferenz
Zu den Favoriten
5

Secure Database Authentication from Vulnerability Detection using Encryption Mode of Standardization
Pasupuleti, Mohan ; Diraviam, A.Justin ; K, Maniunath ; et al.
2022 8th International Conference on Smart Structures and Systems (ICSSS) Smart Structures and Systems (ICSSS), 2022 8th International Conference on. :01-07 Apr, 2022

Konferenz
Zu den Favoriten
7

Preventing SQL injection attacks in stored procedures
Wei, K. ; Muthuprasanna, M. ; Suraj Kothari
Australian Software Engineering Conference (ASWEC'06) Software Engineering Conference Software Engineering Conference, 2006. Australian. :8 pp.-198 2006

Konferenz
Zu den Favoriten
8

Survey on securing a querying process by blocking SQL injection
Gomaa, Yasser ; El Aziz Ahmed, Abd ; Mahmood, Mahmood A. ; et al.
2015 Third World Conference on Complex Systems (WCCS) Complex Systems (WCCS), 2015 Third World Conference on. :1-7 Nov, 2015

Konferenz
Zu den Favoriten
9

Securing web applications against SQL injection attacks - A Parameterised Query perspective)
Okesola, Julius O. ; Ogunbanwo, Afolakemi S. ; Owoade, Ayoade ; et al.
2023 International Conference on Science, Engineering and Business for Sustainable Development Goals (SEB-SDG) Science, Engineering and Business for Sustainable Development Goals (SEB-SDG), 2023 International Conference on. 1:1-6 Apr, 2023

Konferenz
Zu den Favoriten
10

Securing Web Applications with Secure Coding Practices and Integrity Verification
Anis, Arafa ; Zulkernine, Mohammad ; Iqbal, Shahrear ; et al.
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) DASC-PICOM-DATACOM-CYBERSCITECH Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2018 IEEE 16th Intl. :618-625 Aug, 2018

Konferenz
Zu den Favoriten
11

Implementing dynamic certificates for securing database
Gautam, Kiran ; Upadhyay, Divya
2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence) Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference -. :919-922 Sep, 2014

Konferenz
Zu den Favoriten
12

SBSQLID: Securing Web Applications with Service Based SQL Injection Detection
Shanmughaneethi, Shri V. ; Shyni, Smt C. Emilin ; Swamynathan, S.
2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies Advances in Computing, Control, & Telecommunication Technologies, 2009. ACT '09. International Conference on. :702-704 Dec, 2009

Konferenz
Zu den Favoriten
13

A multilevel system to mitigate DDOS, brute force and SQL injection attack for cloud security
Patil, Ajit ; Laturkar, Aishwarya ; Athawale, S. V. ; et al.
2017 International Conference on Information, Communication, Instrumentation and Control (ICICIC) Information, Communication, Instrumentation and Control (ICICIC), 2017 International Conference on. :1-7 Aug, 2017

Konferenz
Zu den Favoriten
14

A novel method for preventing SQL injection using SHA-1 algorithm and syntax-awareness
Temeiza, Qais ; Temeiza, Mohammad ; Itmazi, Jamil
2017 Joint International Conference on Information and Communication Technologies for Education and Training and International Conference on Computing in Arabic (ICCA-TICET) Information and Communication Technologies for Education and Training and International Conference on Computing in Arabic (ICCA-TICET), 2017 Joint International Conference on. :1-4 Aug, 2017

Konferenz
Zu den Favoriten
15

Towards a Secure Web-Based Smart Homes
Al-Syouf, Raghad ; Al-Duwairi, Basheer ; Shatnawi, Ahmad S.
2021 12th International Conference on Information and Communication Systems (ICICS) Information and Communication Systems (ICICS), 2021 12th International Conference on. :195-200 May, 2021

Konferenz
Zu den Favoriten
16

Log Visualization of Intrusion and Prevention Reverse Proxy Server against Web Attacks
Mantoro, Teddy ; Aziz, Normaziah binti Abdul ; Yusoff, Nur Dalilah binti Meor ; et al.
2013 International Conference on Informatics and Creative Multimedia Informatics and Creative Multimedia (ICICM), 2013 International Conference on. :325-329 Sep, 2013

Konferenz
Zu den Favoriten
17

Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications: A survey
Gupta, Mukesh Kumar ; Govil, M.C. ; Singh, Girdhari
International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014) Recent Advances and Innovations in Engineering (ICRAIE), 2014. :1-5 May, 2014

Konferenz
Zu den Favoriten
18

Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
Muthuprasanna, M. ; Ke Wei ; Kothari, S.
2006 Eighth IEEE International Symposium on Web Site Evolution (WSE'06) Web Site Evolution, 2006. WSE '06. Eighth IEEE International Symposium on. :22-32 Sep, 2006

Konferenz
Zu den Favoriten
19

Enhancing Mysql Injector vulnerability checker tool (Mysql Injector) using inference binary search algorithm for blind timing-based attack
Liban, Abdilahi ; Hilles, Shadi M.S.
2014 IEEE 5th Control and System Graduate Research Colloquium Control and System Graduate Research Colloquium (ICSGRC), 2014 IEEE 5th. :47-52 Aug, 2014

Konferenz
Zu den Favoriten
20

Network-based Active Defense for Securing Cloud-based Healthcare Data Processing Pipelines
Akashe, Vaibhav ; Neupane, Roshan Lal ; Alarcon, Mauro Lemus ; et al.
2021 International Conference on Computer Communications and Networks (ICCCN) Computer Communications and Networks (ICCCN), 2021 International Conference on. :1-9 Jul, 2021

Konferenz
Zu den Favoriten

Filter