Results 81 to 90 of about 188,990 (210)

Lightweight Detection Method of Obfuscated Landing Sites Based on the AST Structure and Tokens

open access: yesApplied Sciences, 2020
Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed.
KyungHyun Han, Seong Oun Hwang
doaj   +1 more source

Beyond spring season: An autumn observation of adult lumpsuckers (Cyclopterus lumpus) in coastal Norway Frøya archipelago raises questions on extended spawning activity

open access: yesJournal of Fish Biology, EarlyView.
Abstract During snorkelling near Frøya, central Norway, on 6 October 2025, a pair of adult lumpsuckers (Cyclopterus lumpus) was observed engaged in apparent prespawning behaviour in shallow kelp habitat. Such activity is surprising, as the species is mainly considered a spring spawner throughout the eastern Atlantic and is the focus of a targeted ...
Ole Henriksen   +4 more
wiley   +1 more source

AlkaPlorer: A database‐driven explorer for natural alkaloids and derivatives

open access: yesJournal of Integrative Plant Biology, EarlyView.
The alkaloid database AlkaPlorer integrates over 130,000 compounds across 12,250 species. By linking chemical structures with biological and evolutionary data, it reveals how these molecules evolve and function. This platform serves as a vital resource for AI‐driven discovery in plant metabolism and modern drug development. ABSTRACT Alkaloids, renowned
Jiahao Li   +5 more
wiley   +1 more source

A QUANTITATIVE ANALYSIS OF WEBASSEMBLY INTEGRATION: ARCHITECTURAL PATTERNS, TOOLING, AND PERFORMANCE EVALUATION

open access: yesЕлектроніка та інформаційні технології
Background. WebAssembly (Wasm) is a fundamental component for high-performance web applications, valued for strategic integration, not simple JavaScript replacement.
Oleksandr Stepanov, Halyna Klym
doaj   +1 more source

Make Social Media Social Again: How Platform Interoperability Can Fix Social Media and Future‐Proof Democracy

open access: yesJournal of Management Studies, EarlyView.
Abstract This essay argues that social media document (rather than fuel) the decline of political democracy while helping revive organizational democracy, including through ‘decentralized autonomous organizations’ (DAOs). Yet, despite giving everyone a voice and the ability to organize across borders, social media could over‐concentrate power if, in ...
J.P. Vergne
wiley   +1 more source

Defensive JavaScript [PDF]

open access: yes, 2014
Defensive JavaScript (DJS) is a typed subset of JavaScript that guarantees that the functional behavior of a program cannot be tampered with even if it is loaded by and executed within a malicious environment under the control of the attacker. As such, DJS is ideal for writing JavaScript security components, such as bookmarklets, single sign-on widgets,
Bhargavan, Karthikeyan   +2 more
openaire   +1 more source

ADsafety: Type-Based Verification of JavaScript Sandboxing

open access: yes, 2015
Web sites routinely incorporate JavaScript programs from several sources into a single page. These sources must be protected from one another, which requires robust sandboxing.
Eliopoulos, Spiridon   +3 more
core  

The Effects of Acute Sleep Deprivation on Cognitive Control Mechanisms Associated With Hallucinatory Experiences

open access: yesJournal of Sleep Research, EarlyView.
ABSTRACT Sleep dysfunction can impair cognition and may play a causal role in the development of hallucinations. Deficits in cognitive control have been implicated in cognitive models of hallucinations. To better understand the underpinning role of cognition in the relationship between sleep and hallucinations, the current study aimed to investigate ...
Georgia Punton   +7 more
wiley   +1 more source

Pengines: Web Logic Programming Made Easy

open access: yes, 2014
When developing a (web) interface for a deductive database, functionality required by the client is provided by means of HTTP handlers that wrap the logical data access predicates.
Lager, Torbjörn, Wielemaker, Jan
core   +2 more sources

OralSegNet: An Approach to Early Detection of Oral Disease Using Transfer Learning

open access: yesOral Diseases, EarlyView.
ABSTRACT Objective Deep learning‐based segmentation system is proposed that exploits three variants of YOLOv11 architecture, namely YOLOv11n‐seg, YOLOv11s‐seg, and YOLOv11m‐seg for automated detection and localization of the oral disease conditions from photographic intraoral images.
Pranta Barua   +9 more
wiley   +1 more source

Home - About - Disclaimer - Privacy