Results 41 to 50 of about 38,899 (287)
Overview of cross site request forgery and client-side protection [PDF]
As long as internet and web application are a part of our lives to let us to live as easy as we moved like: online market, online bank, online shop and many more, it take attention of malicious to take an advantage of our easy life.
Abdullah @ Selimun, Mohd Taufik +3 more
core
Objective Cam morphology, which is a significant risk factor for hip osteoarthritis, is commonly quantified by the alpha angle (AA). This study aims to explore the potential of the triangular index ratio (TIR) to quantify cam morphology on anteroposterior radiographs by assessing the association between TIR‐defined cam morphology and the development of
Jinchi Tang +7 more
wiley +1 more source
Rule-defect oriented browser XSS filter test method
In order to alleviate XSS (cross-site scripting) attacks,modern browsers use XSS filters for defense.It is difficult to effectively test and evaluate the security of browser XSS filters.The rule-defect is the defect and security problem in the ...
Zhijie GUI, Hui SHU
doaj +3 more sources
A Workflow to Accelerate Microstructure‐Sensitive Fatigue Life Predictions
This study introduces a workflow to accelerate predictions of microstructure‐sensitive fatigue life. Results from frameworks with varying levels of simplification are benchmarked against published reference results. The analysis reveals a trade‐off between accuracy and model complexity, offering researchers a practical guide for selecting the optimal ...
Luca Loiodice +2 more
wiley +1 more source
Improved cross site scripting filter for input validation against attacks in web services
Nowadays, everybody needs to handle sensitive data like online banking account details and other information related to financial transactions on the Internet.
ELANGOVAN UMA, ARPUTHARAJ KANNAN
doaj
X-Secure:protecting users from big bad wolves [PDF]
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity.
Bellekens, Xavier +3 more
core +3 more sources
Towards Defect Phase Diagrams: From Research Data Management to Automated Workflows
A research data management infrastructure is presented for the systematic integration of heterogeneous experimental and simulation data required for defect phase diagrams. The approach combines openBIS with a companion application for large‐object storage, automated metadata extraction, provenance tracking and federated data access, thereby supporting ...
Khalil Rejiba +5 more
wiley +1 more source
Web Vulnerability Study of Online Pharmacy Sites [PDF]
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core +1 more source
Automatic generation of content security policy to mitigate cross site scripting [PDF]
Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS).
Atan, Rodziah +2 more
core +1 more source
In Situ Micromechanical Study of Bimodal γ′–γ″ Precipitate Assemblies in Ni–Cr–Al–Nb Superalloy
A Ni–Cr–Al–Nb superalloy with a bimodal γ′–γ″ precipitate distribution is developed. Composite precipitate assemblies form through heterogeneous nucleation, effectively impeding dislocation motion. Micropillar compression reveals high strength at room and elevated temperatures, governed by precipitate shearing, with coupled faulting mechanisms ...
Ujjval Bansal +4 more
wiley +1 more source

