|
|
|
Edwin Peralta-Garcia, Juan Quevedo-Monsalbe, Victor Tuesta-Monteza and Juan Arcila-Diaz
Structured Query Language (SQL) injections pose a constant threat to web services, highlighting the need for efficient detection to address this vulnerability. This study compares machine learning algorithms for detecting SQL injections in web microservi...
ver más
|
|
|
|
|
|
|
Yongyao Jiang and Chaowei Yang
With recent advancements, large language models (LLMs) such as ChatGPT and Bard have shown the potential to disrupt many industries, from customer service to healthcare. Traditionally, humans interact with geospatial data through software (e.g., ArcGIS 1...
ver más
|
|
|
|
|
|
|
Rafal Doniec, Eva Odima Berepiki, Natalia Piaseczna, Szymon Siecinski, Artur Piet, Muhammad Tausif Irshad, Ewaryst Tkacz, Marcin Grzegorzek and Wojciech Glinkowski
Cardiovascular diseases (CVDs) are chronic diseases associated with a high risk of mortality and morbidity. Early detection of CVD is crucial to initiating timely interventions, such as appropriate counseling and medication, which can effectively manage ...
ver más
|
|
|
|
|
|
|
Shengkun Gu and Dejiang Wang
Within the domain of architectural urban informatization, the automated precision recognition of two-dimensional paper schematics emerges as a pivotal technical challenge. Recognition methods traditionally employed frequently encounter limitations due to...
ver más
|
|
|
|
|
|
|
Wisal Khan, Teerath Kumar, Cheng Zhang, Kislay Raj, Arunabha M. Roy and Bin Luo
The competent software architecture plays a crucial role in the difficult task of big data processing for SQL and NoSQL databases. SQL databases were created to organize data and allow for horizontal expansion. NoSQL databases, on the other hand, support...
ver más
|
|
|
|
|
|
|
Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injec...
ver más
|
|
|
|
|
|
|
Eduardo Pina, Filipe Sá and Jorge Bernardino
Background: Relational databases have been a prevalent technology for decades, using SQL (Structured Query Language) to manage data. However, the emergence of new technologies, such as the web and the cloud, has brought the requirement to handle more com...
ver más
|
|
|
|
|
|
|
Francesco Calimeri, Nicola Leone, Giovanni Melissari, Francesco Pacenza, Simona Perri, Kristian Reale, Francesco Ricca and Jessica Zangari
In the last few years, we have witnessed the spread of computing devices getting smaller and smaller (e.g., Smartphones, Smart Devices, Raspberry, etc.), and the production and availability of data getting bigger and bigger. This work presents DLV-EE, a ...
ver más
|
|
|
|
|
|
|
Hao Sun, Yuejin Du and Qi Li
Amid the incessant evolution of the Internet, an array of cybersecurity threats has surged at an unprecedented rate. A notable antagonist within this plethora of attacks is the SQL injection assault, a prevalent form of Internet attack that poses a signi...
ver más
|
|
|
|
|
|
|
Seng Choon Toh, Sai Hin Lai, Majid Mirzaei, Eugene Zhen Xiang Soo and Fang Yenn Teo
This study introduces a systematic methodology whereby different technologies were utilized to download, pre-process, and interactively compare the rainfall datasets from the Integrated Multi-Satellite Retrievals for Global Precipitation Mission (IMERG) ...
ver más
|
|
|
|