Results 61 to 70 of about 3,657 (190)
Algorithm Diversity for Resilient Systems
Diversity can significantly increase the resilience of systems, by reducing the prevalence of shared vulnerabilities and making vulnerabilities harder to exploit.
A Avizienis +10 more
core +1 more source
PachyRand: SQL Randomization for the PostgreSQL JDBC Driver [PDF]
Many websites are driven by web applications that deliver dynamic content stored in SQL databases. Such systems take input directly from the client via HTML forms.
Keromytis, Angelos D. +1 more
core +2 more sources
Abstract Tropical forests play a vital role in the global carbon cycle and land–atmosphere interactions. Estimating tropical forest carbon–water dynamics is challenging due to observational and modeling uncertainties. This study leverages the “Trends and drivers of the regional scale terrestrial sources and sinks of carbon dioxide” (TRENDY) project ...
Mingjie Shi +7 more
wiley +1 more source
ABSTRACT Issue Performance and image‐enhancing drug (PIED) use among women is a growing phenomenon, particularly within weight‐training populations. Despite increasing prevalence, research on the psychosocial factors involved in women's PIED use remains emergent and fragmented.
Hannah C. Schuurs +3 more
wiley +1 more source
Abstract Background Ethics and diversity, equity, and inclusion (DEI) are critical aspects of engineering, and connections between ethics/DEI are becoming increasingly common place in engineering education and practice. For example, many engineering professional organizations have integrated DEI into their codes of ethics.
Justin L. Hess +2 more
wiley +1 more source
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk +2 more
wiley +1 more source
Still Wrong Use of Pairings in Cryptography [PDF]
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health systems and wearable technologies ...
Kiraz, Mehmet Sabir, Uzunkol, Osmanbey
core +1 more source
Open‐source libraries are indispensable for modern software development but can create substantial maintenance burdens when they become deprecated or unmaintained. Selecting an appropriate replacement among many candidates remains challenging, since methods relying only on historical mining or similarity metrics often miss subtle differences in meaning.
Jie Luo +3 more
wiley +1 more source
ABSTRACT Background Epilepsy can have a negative impact on cognitive and social functioning. Eslicarbazepine acetate (ESL) is used to treat focal seizures, although its safety and efficacy, particularly as an additional treatment, warrant more study.
Neha Bhagwan Das +9 more
wiley +1 more source
Identifying a Game Console Vulnerability and Potential Exploitation for eBusiness Attacks [PDF]
Game Information System (IS) consoles are used by millions of players at any one time to access the Internet and information resources. In this research we questioned the security of these systems and evaluated one identified vulnerability for the ...
Cusack, Brian, Robinson, Nick
core

