Suggested Topics within your search.
Suggested Topics within your search.
-
81
IMPLEMENTATION OF FUZZY SELECTION OF EQUIPMENT IN INFORMATION NETWORK DESIGN SYSTEM
Published 2014-09-01Subjects: Get full text
Article -
82
A Novel Framework for RDF Schema Extraction in NoSQL Databases Using Sentence-BERT
Published 2025-01-01Subjects: “…NoSQL databases…”
Get full text
Article -
83
Enhancing Security of Databases through Anomaly Detection in Structured Workloads
Published 2025-02-01Subjects: Get full text
Article -
84
Examination Database and Online Paper Forming Algorithm for Mobile Personalized Learning Test
Published 2023-04-01Subjects: Get full text
Article -
85
Enhancing Security of Databases through Anomaly Detection in Structured Workloads
Published 2025-02-01Subjects: Get full text
Article -
86
NOSQL DATABASE LOGIC DESIGN METHODS FOR MONGODB AND NEO4J
Published 2022-06-01Subjects: Get full text
Article -
87
Towards lightweight model using non-local-based graph convolution neural network for SQL injection detection
Published 2025-06-01Subjects: “…SQL injection…”
Get full text
Article -
88
Using RPA for data generation using OCR platforms in Mediterranean University of Albania
Published 2023-03-01Subjects: Get full text
Article -
89
A user-friendly NoSQL framework for managing agricultural field trial data
Published 2024-11-01Subjects: Get full text
Article -
90
Integrando minería de reglas de asociación en PostgreSQL
Published 2022-11-01Subjects: Get full text
Article -
91
Research of cloud disk system construction in campus network
Published 2013-09-01Subjects: “…cloud disk;MooseFS distribute file system;MySQL master-slaver replication;high aviailability…”
Get full text
Article -
92
Application of Relational Databases to the Acceleration of Ray Tracing in High Frequency Asymptotic Techniques
Published 2025-01-01Subjects: Get full text
Article -
93
Beyond Standard Losses: Redefining Text-to-SQL with Task-Specific Optimization
Published 2025-07-01Subjects: “…text-to-SQL…”
Get full text
Article -
94
Models and scenarios of implementation of threats for internet resources
Published 2020-12-01Subjects: Get full text
Article -
95
Critical Evaluation of SQL Injection Security Measures in Web Applications
Published 2025-03-01Subjects: “…SQL Injection, Agent-based Vulnerability Response System (AVRS), Machine Learning, Vulnerability Scanning, Malware Detection…”
Get full text
Article -
96
The Role of Accuracy and Validation Effectiveness in Conversational Business Analytics
Published 2025-01-01Subjects: Get full text
Article -
97
A Model-driven Role-based Access Control for SQL Databases
Published 2015-07-01Subjects: “…Model-driven security, Role-based Access Control, SecureUML, PL/SQL, updatable view, instead-of trigger.…”
Get full text
Article -
98
-
99
COMPARATIVE CHARACTERISTIC OF MEANS OF AUTOMATED CHECK OF THE CORRECTNESS OF WRITING OF SQL REQUESTS
Published 2017-08-01Subjects: Get full text
Article -
100
Long short‐term memory on abstract syntax tree for SQL injection detection
Published 2021-04-01Subjects: Get full text
Article