Results 41 to 50 of about 13,301 (286)
Examining marketing cyber-security in the digital age: Evidence from marketing platforms [PDF]
The current study aimed to examine marketing cyber-security (DDoS Attacks, Cross-Site Scripting, SQL Attacks, and passwords attacks) in the digital age by presenting evidence from digital marketing platforms.
Tareq N. Hashem
doaj +1 more source
A Secure Framework for Communication and Data Processing in Web Applications
Web applications are widely used, and the applications deployed on the web do not always satisfy all the security policies. This may arise due to less secure configurations, less knowledge in security configurations, or due to insecure coding practices ...
Suprakash Sudarsanan Nair +1 more
doaj +1 more source
Overview of cross site request forgery and client-side protection [PDF]
As long as internet and web application are a part of our lives to let us to live as easy as we moved like: online market, online bank, online shop and many more, it take attention of malicious to take an advantage of our easy life.
Abdullah @ Selimun, Mohd Taufik +3 more
core
3D‐Printed Sulfur‐Derived Polymers With Controlled Architectures for Lithium‐Sulfur Batteries
Rheology‐guided formulation design for direct ink writing enables the fabrication of 3D sulfur copolymer cathodes with controlled architectures for lithium‐sulfur batteries. The printed electrodes exhibit multiscale porosity and high sulfur utilization, delivering enhanced electrochemical performance compared to conventional cast electrodes.
Bin Ling +7 more
wiley +1 more source
Control of Polarization and Polar Helicity in BiFeO3 by Epitaxial Strain and Interfacial Chemistry
In BiFeO3 thin films, the interplay of interfacial chemistry, electrostatics, and epitaxial strain is engineered to stabilize homohelicity in polarization textures at the domain scale. The synergistic use of a Bi2O2‐terminated Aurivillius buffer layer and a highly anisotropic compressive epitaxial strain offers new routes to control the polar‐texture ...
Elzbieta Gradauskaite +5 more
wiley +1 more source
Nanosecond pulse laser texturing yields superhydrophobic and superhydrophilic AA2024 surfaces. Salt‐spray tests show that periodic superhydrophobic patterns suppress pitting, whereas superhydrophilic textures enhance it, linking laser‐induced morphology, wettability, and oxide chemistry to corrosion resistance.
Lis Geraldine Zschach +8 more
wiley +1 more source
Improved cross site scripting filter for input validation against attacks in web services
Nowadays, everybody needs to handle sensitive data like online banking account details and other information related to financial transactions on the Internet.
ELANGOVAN UMA, ARPUTHARAJ KANNAN
doaj
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks.
Adam Kieyzun +32 more
core +2 more sources
An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System [PDF]
The web constitutes a complex infrastructure and as demonstrated by numerous attacks, rigorous analysis of standards and web applications is indispensable. Inspired by successful prior work, in particular the work by Akhawe et al.
Fett, Daniel +2 more
core +2 more sources
We describe a microfluidic tumor‐stroma co‐culture model, engineered to resist collagen‐hydrogel contraction driven by fibroblast activity. Surface silanization with APTES covalently anchors the matrix to the chip, while Genipin crosslinking progressively increases stiffness and elasticity without harming cells. This supports >10 days of co‐culture and
Doriane Le Manach +4 more
wiley +1 more source

