Results 91 to 100 of about 13,301 (286)

XSS Attack Detection Method Based on CNN-BiLSTM-Attention

open access: yesApplied Sciences
Cross-site scripting (XSS) is one of the most common security threats to web applications, posing a serious challenge to network information security. Targetting the limitations of traditional detection methods in identifying complex XSS attacks, this ...
Zhiping Li   +3 more
doaj   +1 more source

Securing Web Applications from malware attacks using hybrid feature extraction [PDF]

open access: yes, 2018
In this technological era, many of the applications are taking the utilization of services of internet in order to cater to the needs of its users. With the rise in number of internet users, there's a substantial inflation within the internet attacks ...
Gopireddy Venkata, Kalyani   +2 more
core  

Large‐Scale Genomics Reveals Three‐Source Ancestry and Layered Adaptation to High Altitude in Tibetan Chickens

open access: yesAdvanced Science, EarlyView.
Whole‐genome analysis of 1,054 chickens reveals three ancestral sources (NWC, SYA, and SHF) with distinct temporal entry patterns into the Tibetan Plateau. Route‐specific selection scans, calibrated against a demographic null, suggest complementary functional enrichments—vascular homeostasis (NWC), calcium signaling and cardiac adaptation (SYA), and ...
Zongyi Zhao   +7 more
wiley   +1 more source

The Trichinella Super‐Pangenome Reveals the Evolution of Encapsulation and Predicted Host–Parasite Protein Interactions

open access: yesAdvanced Science, EarlyView.
ABSTRACT The muscle capsule of Trichinella is a critical structure that impedes immune attacks and drug penetration, yet the molecular mechanisms underlying its formation remain poorly understood. Using a high‐quality super‐pangenome comprising 12 Trichinella species, we compared extensive genomic variations between encapsulating and non‐encapsulating ...
Qingbo Lv   +8 more
wiley   +1 more source

SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING

open access: yesInternational Journal of Advances in Signal and Image Sciences
The powerful Open Web Application Security Project (OWASP)-Zed Attack Proxy (ZAP) tool secures web applications with extensive security testing. Its main goal is to find and fix web application vulnerabilities before they can be exploited. The goal is to
S. P. Maniraj   +2 more
doaj   +1 more source

Using Lightweight Formal Methods for JavaScript Security [PDF]

open access: yes, 2010
The goal of this work was to apply lightweight formal methods to the study of the security of the JavaScript language. Previous work has shown that lightweight formal methods present a new approach to the study of security in the context of the Java ...
Reynolds, Mark
core   +1 more source

Cells Dynamically Adapt Their Nuclear Volumes and Proliferation Rates During Single to Multicellular Transitions

open access: yesAdvanced Science, EarlyView.
It is currently not well understood how cells regulate basic properties, e.g., volume and mechanics within dense multicellular environments like tumors. Here, we show that different cell types of cancer and also normal cells largely decrease their nuclear and cellular volumes in emerging cell clusters and that this is partly driven by cell cycle shifts.
Vaibhav Mahajan   +13 more
wiley   +1 more source

Engineering Neuronal Network Connectivity Through Precise and Scalable Electrical Modulation

open access: yesAdvanced Science, EarlyView.
This study presents a scalable all‐electrical method for precise neuronal‐circuit reconfiguration based on high‐density microelectrode arrays. By employing biologically inspired plasticity rules, targeted connectivity changes were successfully induced and quantified across diverse neuronal preparations.
Sreedhar S. Kumar   +10 more
wiley   +1 more source

A PU‐learning based approach for cross‐site scripting attacking reality detection

open access: yesIET Networks
Cross‐site scripting (XSS) attack has been one of the most dangerous attacks in cyberspace security. Traditional methods essentially discover XSS attack by detecting malicious payloads in requests, which is unable to distinguish attacking attempts with ...
Wenbo Wang, Peng Yi, Huikai Xu
doaj   +1 more source

Enhancing Web Application Security with Open-AppSec WAF on CDN Infrastructure

open access: yesJournal of Information Systems and Informatics
The increasing number of cyberattacks targeting web applications has made security a critical concern, with vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Broken Authentication, and Cross-Site Request Forgery (CSRF) remaining ...
Andi Yusdar Al Imran   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy