Results 31 to 40 of about 13,301 (286)

Prevention of Cross-Site Scripting Attacks on Current Web Applications [PDF]

open access: yes, 2007
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organizations. Web applications must therefore include, in addition to the expected value offered to their users, reliable mechanisms to ensure their security. In this paper, we focus on
Joaquín García-Alfaro   +1 more
openaire   +3 more sources

Epilepsy‐Associated Variants of a Single SCN1A Codon Exhibit Divergent Functional Properties

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Pathogenic variants in SCN1A, which encodes the voltage‐gated sodium channel NaV1.1, are associated with multiple epilepsy syndromes exhibiting a range of clinical severity. SCN1A variants are reported in different syndromes, including Dravet syndrome, which is associated with loss‐of‐function, whereas neonatal/infantile‐onset ...
Lanie N. Liebovitz   +3 more
wiley   +1 more source

An Effective Method to Safeguard Cyber Security by Preventing Malicious Data

open access: yesIEEE Access, 2019
In order to ensure the information security of a network, network security devices have been widely deployed in the information and communication network.
Guohua Wang   +7 more
doaj   +1 more source

Detection of Web Cross-Site Scripting (XSS) Attacks

open access: yesElectronics, 2022
Most applications looking for XSS vulnerabilities have a variety of weaknesses related to the nature of constructing internet applications. Existing XSS vulnerability packages solely scan public net resources, which negatively influences the safety of internet resources.
Mohammad Alsaffar   +6 more
openaire   +1 more source

Triangular Index Ratio as an Alternative Method to the Alpha Angle for Defining the Presence of Cam Morphology: A Prospective Cohort Study

open access: yesArthritis Care &Research, EarlyView.
Objective Cam morphology, which is a significant risk factor for hip osteoarthritis, is commonly quantified by the alpha angle (AA). This study aims to explore the potential of the triangular index ratio (TIR) to quantify cam morphology on anteroposterior radiographs by assessing the association between TIR‐defined cam morphology and the development of
Jinchi Tang   +7 more
wiley   +1 more source

Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro

open access: yesJurnal Teknologi dan Sistem Komputer, 2016
The security aspect is often forgotten in the application of Information Technology. The attacks were caused by the negligence of the developer causes damage to the system used. SQL Injection attacks, Cross Site Scripting attacks, and no use of encrypted
Hilal Afrih Juhad   +2 more
doaj   +1 more source

Deep-Learning Based Injection Attacks Detection Method for HTTP

open access: yesMathematics, 2022
In the context of the new era of high digitization and informatization, the emergence of the internet and artificial intelligence technologies has profoundly changed people’s lifestyles. The traditional cyber attack detection has become increasingly weak
Chunhui Zhao   +4 more
doaj   +1 more source

Policy-agnostic programming on the client-side [PDF]

open access: yes, 2017
Browser security has become a major concern especially due to web pages becoming more complex. These web applications handle a lot of information, including sensitive data that may be vulnerable to attacks like data exfiltration, cross-site scripting ...
Palesha, Kushal
core   +1 more source

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

A Workflow to Accelerate Microstructure‐Sensitive Fatigue Life Predictions

open access: yesAdvanced Engineering Materials, EarlyView.
This study introduces a workflow to accelerate predictions of microstructure‐sensitive fatigue life. Results from frameworks with varying levels of simplification are benchmarked against published reference results. The analysis reveals a trade‐off between accuracy and model complexity, offering researchers a practical guide for selecting the optimal ...
Luca Loiodice   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy