5 Questions 6 Answers 0 Followers
Questions related from J E T Akinsola
There are various secure learning systems, which of them can be implemented for SQL injection attack
10 August 2018 5,131 1 View
What are the tools one can use for extracting anomaly patterns in SQL injection attack dataset in order to build a model for the classification ?
10 August 2018 5,879 3 View
What are different sources for datasets can be used for implementing SQL Injection Attack (SQLiA) research / experiment?
10 August 2018 2,257 6 View
What are the assessment methods that can be employed to mitigate Cyber Risk
06 June 2018 3,715 4 View
I will like to know how Big Data Analytics can be applied in Social Network. What are the parameters to consider in social networks for big data analytics. How can I mine big data in social networks.
15 July 2016 1,634 4 View