Ogundijo et al., 2022
ViewPDF| Publication | Publication Date | Title | 
|---|---|---|
| Sabir et al. | Machine learning for detecting data exfiltration: A review | |
| Tripathy et al. | Detecting SQL injection attacks in cloud SaaS using machine learning | |
| US8955133B2 (en) | Applying antimalware logic without revealing the antimalware logic to adversaries | |
| CN107645503B (en) | A rule-based detection method for malicious domain names belonging to DGA family | |
| Demilie et al. | Detection and prevention of SQLI attacks and developing compressive framework using machine learning and hybrid techniques | |
| Lee et al. | A novel method for SQL injection attack detection based on removing SQL query attribute values | |
| Sadeghian et al. | A taxonomy of SQL injection detection and prevention techniques | |
| Dalai et al. | Neutralizing SQL injection attack using server side code modification in web applications | |
| Shachi et al. | A survey on detection and prevention of SQL and NoSQL injection attack on server-side applications | |
| Mounika et al. | Analyzing CVE database using unsupervised topic modelling | |
| US20240241956A1 (en) | Classifying cybersecurity threats using machine learning on non-euclidean data | |
| Park et al. | Web application intrusion detection system for input validation attack | |
| Hadabi et al. | An efficient model to detect and prevent SQL injection attack | |
| Falana et al. | Detection of cross-site scripting attacks using dynamic analysis and fuzzy inference system | |
| Brindavathi et al. | An Analysis of AI-based SQL Injection (SQLi) Attack Detection | |
| AliAhmad et al. | Malware detection issues, future trends and challenges: a survey | |
| Zhong et al. | A security log analysis scheme using deep learning algorithm for IDSs in social network | |
| Ogundijo et al. | SQLIA TYPES AND TECHNIQUES-A SYSTEMATIC ANALYSIS OF EFFECTIVE PERFORMANCE METRICS FOR SQL INJECTION VULNERABILITY MITIGATION TECHNIQUES | |
| Pillai et al. | A novel web attack detection mechanism using maximal-munch with torrent deep network | |
| CN114793164B (en) | Multi-feature-based APT attack event correlation method | |
| Sahin et al. | An efficient firewall for web applications (EFWA) | |
| Wu et al. | Test SQL injection vulnerabilities in web applications based on structure matching | |
| Morufu et al. | A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack | |
| Zahid | Vulnerability detection and prevention: an approach to enhance cybersecurity | |
| AbuShqeir | Common Pattern Generation for the Detection of LOLBin Attacks |