Automatic detection algorithm for vulnerability of SQL-injection
Saved in:
| Date: | 2019 |
|---|---|
| Main Authors: | A. T. Rakhmanov, Kh. Khamdamov, K. F. Kerimov, Sh. K. Kamalov |
| Format: | Article |
| Language: | English |
| Published: |
2019
|
| Series: | International Scientific Technical Journal «Problems of Control and Informatics» |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001246387 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Methods of blocking the vulnerabilities of the XSS type based on service-oriented architecture
by: Kh. Khamdamov, et al.
Published: (2019)
by: Kh. Khamdamov, et al.
Published: (2019)
A three-layer defense mechanism based on web servers against distributed denial of service attacks
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
An algorithm for segmentation of symbols of a vehicle license plate
by: Kh. Khamdamov, et al.
Published: (2019)
by: Kh. Khamdamov, et al.
Published: (2019)
An approach to website vulnerability detection based on static and dynamic analysis
by: Popereshnyak, S.V., et al.
Published: (2026)
by: Popereshnyak, S.V., et al.
Published: (2026)
Algorithm for improving interpretability of support vector models for anomaly detection in network traffic
by: Kerimov, K., et al.
Published: (2025)
by: Kerimov, K., et al.
Published: (2025)
Studying the algorithms of segmentation of X-ray TV images of welds for automatic detection of defects
by: Ja. P. Lazorenko, et al.
Published: (2009)
by: Ja. P. Lazorenko, et al.
Published: (2009)
Database protection based on web application firewall
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Алгоритм автоматического обнаружения уязвимости вида SQL-инъекции
by: Рахманов, А.Т., et al.
Published: (2019)
by: Рахманов, А.Т., et al.
Published: (2019)
Analysis of Usage of SQL Detector Based on Artificial Intelligence in Serverless Architecture
by: T. O. Naumenko, et al.
Published: (2021)
by: T. O. Naumenko, et al.
Published: (2021)
Synthesis of algorithms for recognition of vulnerabilities in web-resources through signatures of fuzzy linguistic features
by: O. A. Iliashov
Published: (2017)
by: O. A. Iliashov
Published: (2017)
Трансляция естественно-языковых запросов к базе данных в SQL-запросы
by: Звенигородский, А.С., et al.
Published: (2012)
by: Звенигородский, А.С., et al.
Published: (2012)
Method of developing a web-application brandmauer
by: Kh. Khamdamov, et al.
Published: (2019)
by: Kh. Khamdamov, et al.
Published: (2019)
Application of the sontinuous wavelet transformation (CWT) for the automatic detection of interictal epileptic discharges
by: T. V. Prybalovets, et al.
Published: (2016)
by: T. V. Prybalovets, et al.
Published: (2016)
Algorithm for automatic loop parallelization for graphics processing units
by: Doroshenko, A.Yu., et al.
Published: (2018)
by: Doroshenko, A.Yu., et al.
Published: (2018)
Algorithm for automatic loop parallelization for graphics processing units
by: Yu. Doroshenko, et al.
Published: (2017)
by: Yu. Doroshenko, et al.
Published: (2017)
Algorithm for automatic loop parallelization for graphics processing units
by: Doroshenko, А.Yu., et al.
Published: (2018)
by: Doroshenko, А.Yu., et al.
Published: (2018)
Matching data between electronic documents and database tables with automated SQL-query generation
by: Marulin, S.Yu.
Published: (2025)
by: Marulin, S.Yu.
Published: (2025)
Рекурсивні запити в SQL-подібних мовах: приклади, змістова і формальна семантика
by: Буй, Д.Б., et al.
Published: (2010)
by: Буй, Д.Б., et al.
Published: (2010)
Algorithm for automatic loop parallelization for graphics processing units
by: I. Z. Ashur, et al.
Published: (2018)
by: I. Z. Ashur, et al.
Published: (2018)
Social vulnerability of the population of Ukraine: conceptual and spatial modeling
by: L. K. Semiv, et al.
Published: (2022)
by: L. K. Semiv, et al.
Published: (2022)
Vulnerability of complex network structures and systems
by: O. D. Polishchuk
Published: (2020)
by: O. D. Polishchuk
Published: (2020)
Priorities for Social Vulnerability Reduction Policy
by: O. V. Makarova
Published: (2017)
by: O. V. Makarova
Published: (2017)
Algebraic patterns of binary code vulnerabilities
by: V. M. Yakovlev
Published: (2020)
by: V. M. Yakovlev
Published: (2020)
Algebraic patterns of binary code vulnerabilities
by: Yakovlev, V.M.
Published: (2020)
by: Yakovlev, V.M.
Published: (2020)
Online detection of phase resistance of switched reluctance motor by sinusoidal signal injection
by: Lee, Y.
Published: (2025)
by: Lee, Y.
Published: (2025)
Algorithm For Automatic Determination of Semantic Relations Between Concepts of Ontologies
by: A. A. Marchenko
Published: (2013)
by: A. A. Marchenko
Published: (2013)
Algebraic Approach to Vulnerabilities Formalization in the Binary Code
by: O. O. Letychevskyi, et al.
Published: (2019)
by: O. O. Letychevskyi, et al.
Published: (2019)
Social vulnerability assessment: theoretical and methodological aspects
by: O. T. Ryndzak
Published: (2022)
by: O. T. Ryndzak
Published: (2022)
Methods, algorithms and intellected soft ware for automation of automatic and dispatching control of EPS
by: V. M. Avramenko, et al.
Published: (2015)
by: V. M. Avramenko, et al.
Published: (2015)
Algorithm for Detection and Identification of Slow Targets
by: Sytnik, O. V.
Published: (2013)
by: Sytnik, O. V.
Published: (2013)
An approach to detection of noise-distorted signals based on the method of S-preparation for automatic coordinate meters of correlation type
by: L. I. Timchenko, et al.
Published: (2015)
by: L. I. Timchenko, et al.
Published: (2015)
Structural vulnerability and financial instability in Ukraine: global context
by: S. O. Korablin, et al.
Published: (2018)
by: S. O. Korablin, et al.
Published: (2018)
Human trafficking as a form of violence on vulnerable populations
by: O. I. Kotliar
Published: (2016)
by: O. I. Kotliar
Published: (2016)
An attempt to assess the vulnerability of breeding birds of Ukraine to climate change
by: M. V. Bannik, et al.
Published: (2010)
by: M. V. Bannik, et al.
Published: (2010)
Social services for vulnerable groups of the population in territorial communities of Ukraine
by: T. A. Zaiats, et al.
Published: (2022)
by: T. A. Zaiats, et al.
Published: (2022)
Innovative Social Work Practices for Vulnerable Groups of the Population in Ukraine
by: Yu. V. Horemykina
Published: (2020)
by: Yu. V. Horemykina
Published: (2020)
Typology of the Vulnerable People and Groups: A Legal and Historical Reconstruction
by: I. M. Sharkova
Published: (2018)
by: I. M. Sharkova
Published: (2018)
Problems of Social Vulnerability of Internally Displaced Persons and Forced Migrants
by: I. Novak
Published: (2022)
by: I. Novak
Published: (2022)
General algorithm of computation of c-table and detection of valleys
by: Gilewicz, J., et al.
Published: (2010)
by: Gilewicz, J., et al.
Published: (2010)
Similar Items
-
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021) -
Methods of blocking the vulnerabilities of the XSS type based on service-oriented architecture
by: Kh. Khamdamov, et al.
Published: (2019) -
A three-layer defense mechanism based on web servers against distributed denial of service attacks
by: A. T. Rakhmanov, et al.
Published: (2019) -
An algorithm for segmentation of symbols of a vehicle license plate
by: Kh. Khamdamov, et al.
Published: (2019) -
An approach to website vulnerability detection based on static and dynamic analysis
by: Popereshnyak, S.V., et al.
Published: (2026)