Results 41 to 50 of about 38,899 (287)

Overview of cross site request forgery and client-side protection [PDF]

open access: yes, 2013
As long as internet and web application are a part of our lives to let us to live as easy as we moved like: online market, online bank, online shop and many more, it take attention of malicious to take an advantage of our easy life.
Abdullah @ Selimun, Mohd Taufik   +3 more
core  

Triangular Index Ratio as an Alternative Method to the Alpha Angle for Defining the Presence of Cam Morphology: A Prospective Cohort Study

open access: yesArthritis Care &Research, EarlyView.
Objective Cam morphology, which is a significant risk factor for hip osteoarthritis, is commonly quantified by the alpha angle (AA). This study aims to explore the potential of the triangular index ratio (TIR) to quantify cam morphology on anteroposterior radiographs by assessing the association between TIR‐defined cam morphology and the development of
Jinchi Tang   +7 more
wiley   +1 more source

Rule-defect oriented browser XSS filter test method

open access: yes网络与信息安全学报, 2018
In order to alleviate XSS (cross-site scripting) attacks,modern browsers use XSS filters for defense.It is difficult to effectively test and evaluate the security of browser XSS filters.The rule-defect is the defect and security problem in the ...
Zhijie GUI, Hui SHU
doaj   +3 more sources

A Workflow to Accelerate Microstructure‐Sensitive Fatigue Life Predictions

open access: yesAdvanced Engineering Materials, EarlyView.
This study introduces a workflow to accelerate predictions of microstructure‐sensitive fatigue life. Results from frameworks with varying levels of simplification are benchmarked against published reference results. The analysis reveals a trade‐off between accuracy and model complexity, offering researchers a practical guide for selecting the optimal ...
Luca Loiodice   +2 more
wiley   +1 more source

Improved cross site scripting filter for input validation against attacks in web services

open access: yesKuwait Journal of Science, 2014
Nowadays, everybody needs to handle sensitive data like online banking account details and other information related to financial transactions on the Internet.
ELANGOVAN UMA, ARPUTHARAJ KANNAN
doaj  

X-Secure:protecting users from big bad wolves [PDF]

open access: yes, 2016
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity.
Bellekens, Xavier   +3 more
core   +3 more sources

Towards Defect Phase Diagrams: From Research Data Management to Automated Workflows

open access: yesAdvanced Engineering Materials, EarlyView.
A research data management infrastructure is presented for the systematic integration of heterogeneous experimental and simulation data required for defect phase diagrams. The approach combines openBIS with a companion application for large‐object storage, automated metadata extraction, provenance tracking and federated data access, thereby supporting ...
Khalil Rejiba   +5 more
wiley   +1 more source

Web Vulnerability Study of Online Pharmacy Sites [PDF]

open access: yes
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core   +1 more source

Automatic generation of content security policy to mitigate cross site scripting [PDF]

open access: yes, 2016
Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS).
Atan, Rodziah   +2 more
core   +1 more source

In Situ Micromechanical Study of Bimodal γ′–γ″ Precipitate Assemblies in Ni–Cr–Al–Nb Superalloy

open access: yesAdvanced Engineering Materials, EarlyView.
A Ni–Cr–Al–Nb superalloy with a bimodal γ′–γ″ precipitate distribution is developed. Composite precipitate assemblies form through heterogeneous nucleation, effectively impeding dislocation motion. Micropillar compression reveals high strength at room and elevated temperatures, governed by precipitate shearing, with coupled faulting mechanisms ...
Ujjval Bansal   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy