Taxonomy of SQL Injection: ML Trends & Open Challenges
SQL injections are a significant and ever-present threat to web applications and database security. During these attacks, malicious SQL statements are injected into input fields of data-driven systems, leading to unauthorized access and data breaches. Consequently, a need is generated to understand...
| Main Authors: | Abobakr Busaeed, Raed Abdullah, Wan Isni Sofiah, Wan Din, Waseem, Quadri, Azlee, Zabidi |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
IEEE
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/38717/ http://umpir.ump.edu.my/id/eprint/38717/1/Taxonomy_of_SQL_Injection_ML_Trends_amp_Open_Challenges.pdf http://umpir.ump.edu.my/id/eprint/38717/2/Taxonomy%20of%20SQL%20Injection.pdf |
Similar Items
Drift management in ML-based IoT device classification: A survey and evaluation
by: Waseem, Quadri, et al.
Published: (2024)
by: Waseem, Quadri, et al.
Published: (2024)
A survey and analysis of feature selection techniques in machine learning for IoT device classification within smart buildings
by: Waseem, Quadri, et al.
Published: (2025)
by: Waseem, Quadri, et al.
Published: (2025)
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
A generalized three-tier hybrid model for classifying unseen (IoT devices) in smart home environments
by: Waseem, Quadri, et al.
Published: (2025)
by: Waseem, Quadri, et al.
Published: (2025)
Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun
by: Goh, Wei Sheng, et al.
Published: (2023)
by: Goh, Wei Sheng, et al.
Published: (2023)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
A survey of NewSQL DBMSs focusing on taxonomy, comparison and open issues
by: Abdullah, Muhammed, et al.
Published: (2021)
by: Abdullah, Muhammed, et al.
Published: (2021)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Quantitative analysis and performance evaluation of target-oriented replication strategies in cloud computing
by: Waseem, Quadri, et al.
Published: (2021)
by: Waseem, Quadri, et al.
Published: (2021)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Exploring Machine Learning in IoT Smart Home Automation
by: Waseem, Quadri, et al.
Published: (2023)
by: Waseem, Quadri, et al.
Published: (2023)
Internet of Things: An Implementation and Its Challenges in Malaysia
by: Wan Isni Sofiah, Wan Din, et al.
Published: (2018)
by: Wan Isni Sofiah, Wan Din, et al.
Published: (2018)
SQL injection penetration testing tutorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Future technology: Software-defined network (SDN) forensic
by: Waseem, Quadri, et al.
Published: (2021)
by: Waseem, Quadri, et al.
Published: (2021)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
Software-Defined Networking (SDN): A review
by: Waseem, Quadri, et al.
Published: (2022)
by: Waseem, Quadri, et al.
Published: (2022)
Ergonomic wireless digital notice board
by: Wan Isni Sofiah, Wan Din, et al.
Published: (2021)
by: Wan Isni Sofiah, Wan Din, et al.
Published: (2021)
Implementing Smart College Chatbot using Ml And Python
by: Sangamesh, R.K., et al.
Published: (2024)
by: Sangamesh, R.K., et al.
Published: (2024)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
Detection of SQL injection attack using machine learning
by: Tung, Tean Thong
Published: (2024)
by: Tung, Tean Thong
Published: (2024)
ML restructuring workshop
by: Wan Jumani, Fauzi
Published: (2012)
by: Wan Jumani, Fauzi
Published: (2012)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
by: A., Fairuzullah, et al.
by: A., Fairuzullah, et al.
Enhancing Campus Communication: Advanced ML Techniques for College
Chatbots
by: Annapoorna, CM, et al.
Published: (2024)
by: Annapoorna, CM, et al.
Published: (2024)
Application of machine learning and artificial intelligence in detecting SQL injection attacks
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Automatic idea generation and analysis using NLP and ML techniques
by: Liu, Haixia
Published: (2019)
by: Liu, Haixia
Published: (2019)
Non-Linear Autoregressive with exogenous input (Narx) chiller plant prediction model
by: Azlee, Zabidi, et al.
Published: (2021)
by: Azlee, Zabidi, et al.
Published: (2021)
Restaurant O SIX JOINT online ordering system with anti-SQL injection
by: Tang, Jie Yi, et al.
Published: (2021)
by: Tang, Jie Yi, et al.
Published: (2021)
A Review of Recent Trends: Text Mining of Taxonomy Using WordNet 3.1 for the Solution and Problems of Ambiguity in Social Media
by: Hasan, Ali Muttaleb, et al.
Published: (2020)
by: Hasan, Ali Muttaleb, et al.
Published: (2020)
Distance based thresholds for 2-tier relay nodes selection in WSN
by: Azamuddin, Abdul Rahman, et al.
Published: (2019)
by: Azamuddin, Abdul Rahman, et al.
Published: (2019)
The relevance of bibliometric analysis to discover the area's research efforts: Root exploit evolution
by: Che Akmal, Che Yahaya, et al.
Published: (2022)
by: Che Akmal, Che Yahaya, et al.
Published: (2022)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
A taxonomy and survey of semantic approaches for query expansion
by: Raza, Muhammad Ahsan, et al.
Published: (2019)
by: Raza, Muhammad Ahsan, et al.
Published: (2019)
Stability analysis of relay access protocol (RAP) using fuzzy logic in wireless sensor networks
by: Azamuddin, Abdul Rahman, et al.
Published: (2020)
by: Azamuddin, Abdul Rahman, et al.
Published: (2020)
Similar Items
-
Drift management in ML-based IoT device classification: A survey and evaluation
by: Waseem, Quadri, et al.
Published: (2024) -
A survey and analysis of feature selection techniques in machine learning for IoT device classification within smart buildings
by: Waseem, Quadri, et al.
Published: (2025) -
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018) -
A generalized three-tier hybrid model for classifying unseen (IoT devices) in smart home environments
by: Waseem, Quadri, et al.
Published: (2025) -
Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun
by: Goh, Wei Sheng, et al.
Published: (2023)