What are the tools one can use for extracting anomaly patterns in SQL injection attack dataset in order to build a model for the classification ?
http://ieeexplore.ieee.org/document/7987433/
Conference Paper Numerical encoding to Tame SQL injection attacks
Conference Paper Applied Machine Learning Predictive Analytics to SQL Injecti...
https://arxiv.org/pdf/1605.02796
http://www.indjst.org/index.php/indjst/article/download/115513/81457
hello
it will be best to use sqlmap tools and burpsuit and in the end use python programming.
@ Rebwar Karimi thanks so much for teh answer and your suggestion.
what are the attributes classification for sql injection attack detection?
There are various secure learning systems, which of them can be implemented for SQL injection attack
07 August 2018 6,792 1 View
How can I get dataset (s) for SQL injection attack research to be implemented using Machine learning algorithms? What are the attributes classification for SQL injection attack detection?
07 August 2018 3,523 3 View
How can pattern learning anomaly detection can be carried out for SQL Injection attack.? Which of the learning anomaly detection tools can be used to classify SQL injection dataset?
07 August 2018 3,009 2 View
Cloud computing has been playing a major role in Audit assignment of recent. This approach has helped in increasing profitability.
06 July 2018 6,901 0 View
Big Data has been used in recent times to provide solutions to cyber security challenges. Therefore, many vulnerability assessment can be carried out. What are the types of vulnerability...
05 June 2018 2,493 5 View
I will like to know how Big Data Analytics can be applied in Social Network. What are the parameters to consider in social networks for big data analytics. How can I mine big data in social networks.
06 July 2016 7,856 4 View
Big Data phenomenon in mobile communication network are: Call Volume, Call Pattern and Location. Also, Call Detail Records (CDR) is of paramount importance in mobile communication network
06 July 2016 3,558 1 View
The Big Data collected from mobile communication network how can it be used for development
06 July 2016 4,636 2 View
The cost of memory must be reasonable in relationship to other components.
01 January 1970 10,364 0 View
I have been doing the m6A dot blot for a while with no improvement, I am extracting the RNA, and I can see the dots although the three biological replicas give a different reading on the memberan...
10 August 2024 8,539 5 View
How can I use the cif data obtained from rietveld refinement extracted via gsas2, for microstructural analysis using ETEX software?
09 August 2024 7,718 0 View
Palmitic acid presence in aqueous fraction
05 August 2024 8,624 4 View
I work on MCF7 cell cell for anticaner purpose and I wa to do drug preperation the drug ( secondary metabolites extracted from Aspergillus) My question which solvent is better with these secodary...
03 August 2024 4,725 2 View
I am conducting a systematic review and meta analysis; as I am extracting data I realized there is a consort diagram that shows the number of patients from randomization till end of the study. So...
01 August 2024 9,993 3 View
99% pure ethanol was used for maceration also alternate methods along with the temperature and time to concentrate the extract can be specified
31 July 2024 5,113 4 View
We conducted an antibacterial study of a plant extract. Varying concentrations of crude extract were subjected to microbroth dilution assay. The result showed that only the lowest concentration of...
31 July 2024 8,666 3 View
I am currently investigating the cytotoxicity of a series of herbal extracts, and like many studies, I have been using the MTT assay to evaluate cell viability. However, I am encountering a...
31 July 2024 193 4 View
how can I extract my bibliography from researchgate ?
28 July 2024 6,737 1 View
Understand how to utilize biosynthesis to develop natural and sustainable solutions to address heavy metal pollution and improve environmental and agricultural conditions.
26 July 2024 1,469 1 View