Results 51 to 60 of about 13,301 (286)
Rule-defect oriented browser XSS filter test method
In order to alleviate XSS (cross-site scripting) attacks,modern browsers use XSS filters for defense.It is difficult to effectively test and evaluate the security of browser XSS filters.The rule-defect is the defect and security problem in the ...
Zhijie GUI, Hui SHU
doaj +3 more sources
Malicious JavaScript Detection Based on Bidirectional LSTM Model
JavaScript has been widely used on the Internet because of its powerful features, and almost all the websites use it to provide dynamic functions. However, these dynamic natures also carry potential risks.
Xuyan Song +3 more
doaj +1 more source
Web Vulnerability Study of Online Pharmacy Sites [PDF]
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core +1 more source
Transition metal oxy/carbo‐nitrides show great promise as catalysts for sustainable processes. A Mn‐Mo mixed‐metal oxynitride attains remarkable performance for the direct synthesis of acetonitrile, an important commodity chemical, via sequential C─N and C─C coupling from syngas (C1) and ammonia (N1) feedstocks.
M. Elena Martínez‐Monje +7 more
wiley +1 more source
Adversarial Examples Detection for XSS Attacks Based on Generative Adversarial Networks
Models based on deep learning are prone to misjudging the results when faced with adversarial examples. In this paper, we propose an MCTS-T algorithm for generating adversarial examples of cross-site scripting (XSS) attacks based on Monte Carlo tree ...
Xueqin Zhang +4 more
doaj +1 more source
Atomistic Mechanisms Triggered by Joule Heating Effects in Metallic Cu‐Bi Nanowires for Spintronics
Bi doped metallic Cu nanowires are promising for spintronics thanks to the stabilization of a giant spin Hall effect. However, heat resulting from current injection forces Bi to leave solution, forcing segregation into monoatomic decorations which evolve into coherent crystalline aggregates.
Alejandra Guedeja‐Marrón +6 more
wiley +1 more source
Single password authentication method for remote user based on mobile terminal assistance
To address the issue that users frequently reuse their weak passwords in password-based authentication system,single password authentication based on secret sharing between server and mobile terminal (SPASS) was proposed,which allows a remote user to use
Yuan XU, Chao YANG, Li YANG
doaj +2 more sources
A Grammatical Inference Approach to Language-Based Anomaly Detection in XML [PDF]
False-positives are a problem in anomaly-based intrusion detection systems. To counter this issue, we discuss anomaly detection for the eXtensible Markup Language (XML) in a language-theoretic view.
Lampesberger, Harald
core +1 more source
Drawing inspiration from the layered hard‐soft architecture found in sea sponges, this work establishes a new framework for architected cementitious composites (ACC) through multi‐material additive manufacturing (MMAM) process. The integration of mortar and elastomer phases into layered architectures enables synergistic toughening mechanisms, including
Aimane Najmeddine +5 more
wiley +1 more source
3D‐Printable, Honeycomb‐Inspired Tissue‐Like Bioelectrodes for Patient‐Specific Neural Interface
3D printed MRI‐compatible tissue‐like neural electrodes tailored to individual gyral patterns. This honeycomb‐inspired printable gel electrode (HiPGE) employs a bioinspired architecture with soft hydrogels, engineered to match the softness of brain tissue.
Marzia Momin +12 more
wiley +1 more source

