Results 81 to 90 of about 188,990 (210)
Lightweight Detection Method of Obfuscated Landing Sites Based on the AST Structure and Tokens
Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed.
KyungHyun Han, Seong Oun Hwang
doaj +1 more source
Abstract During snorkelling near Frøya, central Norway, on 6 October 2025, a pair of adult lumpsuckers (Cyclopterus lumpus) was observed engaged in apparent prespawning behaviour in shallow kelp habitat. Such activity is surprising, as the species is mainly considered a spring spawner throughout the eastern Atlantic and is the focus of a targeted ...
Ole Henriksen +4 more
wiley +1 more source
AlkaPlorer: A database‐driven explorer for natural alkaloids and derivatives
The alkaloid database AlkaPlorer integrates over 130,000 compounds across 12,250 species. By linking chemical structures with biological and evolutionary data, it reveals how these molecules evolve and function. This platform serves as a vital resource for AI‐driven discovery in plant metabolism and modern drug development. ABSTRACT Alkaloids, renowned
Jiahao Li +5 more
wiley +1 more source
Background. WebAssembly (Wasm) is a fundamental component for high-performance web applications, valued for strategic integration, not simple JavaScript replacement.
Oleksandr Stepanov, Halyna Klym
doaj +1 more source
Abstract This essay argues that social media document (rather than fuel) the decline of political democracy while helping revive organizational democracy, including through ‘decentralized autonomous organizations’ (DAOs). Yet, despite giving everyone a voice and the ability to organize across borders, social media could over‐concentrate power if, in ...
J.P. Vergne
wiley +1 more source
Defensive JavaScript (DJS) is a typed subset of JavaScript that guarantees that the functional behavior of a program cannot be tampered with even if it is loaded by and executed within a malicious environment under the control of the attacker. As such, DJS is ideal for writing JavaScript security components, such as bookmarklets, single sign-on widgets,
Bhargavan, Karthikeyan +2 more
openaire +1 more source
ADsafety: Type-Based Verification of JavaScript Sandboxing
Web sites routinely incorporate JavaScript programs from several sources into a single page. These sources must be protected from one another, which requires robust sandboxing.
Eliopoulos, Spiridon +3 more
core
ABSTRACT Sleep dysfunction can impair cognition and may play a causal role in the development of hallucinations. Deficits in cognitive control have been implicated in cognitive models of hallucinations. To better understand the underpinning role of cognition in the relationship between sleep and hallucinations, the current study aimed to investigate ...
Georgia Punton +7 more
wiley +1 more source
Pengines: Web Logic Programming Made Easy
When developing a (web) interface for a deductive database, functionality required by the client is provided by means of HTTP handlers that wrap the logical data access predicates.
Lager, Torbjörn, Wielemaker, Jan
core +2 more sources
OralSegNet: An Approach to Early Detection of Oral Disease Using Transfer Learning
ABSTRACT Objective Deep learning‐based segmentation system is proposed that exploits three variants of YOLOv11 architecture, namely YOLOv11n‐seg, YOLOv11s‐seg, and YOLOv11m‐seg for automated detection and localization of the oral disease conditions from photographic intraoral images.
Pranta Barua +9 more
wiley +1 more source

