Effective Filter for Common Injection Attacks in Online Web Applications
Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community with the design of an effective
Santiago Ibarra-Fiallos +5 more
doaj +1 more source
Scientific reference style using rule-based machine learning
Regular Expressions (RegEx) can be employed as a technique for supervised learning to define and search for specific patterns inside text. This work devised a method that utilizes regular expressions to convert the reference style of academic papers into
Afrida Helen +2 more
doaj +1 more source
The use of syntax trees in order to automate the correction of LaTeX documents [PDF]
The problem is to automate the correction of LaTeX documents. Each document is represented as a parse tree. The modified Zhang-Shasha algorithm is used to construct a mapping of tree vertices of the original document to the tree vertices of the edited ...
Kirill Vladimirovich Chuvilin
doaj +1 more source
Determine point-to-point networking interactions using regular expressions
As Internet growth and becoming more popular, the number of concurrent data flows start to increasing, which makes sense in bandwidth requested. Providers and corporate customers need ability to identify point-to-point interactions.
Konstantin S. Deev, Yuriy V. Boyko
doaj +1 more source
A novel algorithm for the conversion of shuffle regular expressions into non-deterministic finite automata [PDF]
Regular expressions with shuffle operators are widely used in diverse fields of computer science. The work presented here investigates the shuffling of regular expressions and their conversion into non-deterministic finite automata.
Ajay Kumar, Anil Kumar Verma
doaj +1 more source
Processing SPARQL queries with regular expressions in RDF databases [PDF]
Background: As the Resource Description Framework (RDF) data model is widely used for modeling and sharing a lot of online bioinformatics resources such as Uniprot (dev.isb-sib.ch/projects/uniprot-rdf) or Bio2RDF (bio2rdf.org), SPARQL - a W3C ...
Han, WS +6 more
core +1 more source
Research on real-world knowledge mining and knowledge graph completion v(III):structured information extraction from real world data of bladder cancer based on regular expression [PDF]
With the development of medical big data, the real-world study (RWS) has received increasing attention in recent years, and has a good promising prospect.
MA Wenhao +9 more
doaj +1 more source
Arabic Text Processing Model: Verbs Roots and Conjugation Automation
The Natural Language Processing (NLP) is a process to automate the text or speech of Natural Languages. This automation is mainly conducted for Western languages. The Arabic Language got less focus in this area.
Mohamed Tahar Ben Othman +2 more
doaj +1 more source
Service Function Chaining Based on Grammar in Software Defined Networks [PDF]
Service Function Chaining is an architecture for orchestrating network services that assign choice to the network. This architecture is essentially a policy structure that should form the proper chain of services.
Pouya Khosravian Dehkordi +3 more
doaj +1 more source
Sound regular expression semantics for dynamic symbolic execution of JavaScript [PDF]
Support for regular expressions in symbolic execution-based tools for test generation and bug finding is insufficient. Common aspects of mainstream regular expression engines, such as backreferences or greedy matching, are ignored or imprecisely ...
Blake Loring +2 more
semanticscholar +1 more source

