Results 51 to 60 of about 12,963 (201)
Abstract Erythropoietin (EPO) administration stimulates haematological and non‐haematological adaptations that alter substrate oxidation and enhance aerobic performance. The effects of strenuous exercise and EPO on metabolites, and whether any effect is associated with haematological and non‐haematological adaptations, has not been assessed.
Devin J. Drummer +11 more
wiley +1 more source
Implementasi Intrusion Prevention System (IPS) Menggunakan Suricata Untuk Serangan SQL Injection
Intrusion Prevention System (IPS) merupakan salah satu tool pengamanan pada jaringan. Pada penelitian ini Suricata sebagai IPS untuk melindungi webserver dari serangan SQL Injection menggunakan SQLMap dengan melihat efektifitas rules dan parameter ...
Faula Tanang Anugrah +2 more
doaj +1 more source
SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core +1 more source
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
Perancangan Keamanan Sistem Menggunakan Algoritma Honeypot pada Aplikasi Krs Online (Studi Kasus : Sekolah Tinggi Teknologi Adisutjipto) [PDF]
Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force.
Sajati, H. (Haruno) +2 more
core
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando +4 more
core +1 more source
Vulnerability anti-patterns:a timeless way to capture poor software practices (Vulnerabilities) [PDF]
There is a distinct communication gap between the software engineering and cybersecurity communities when it comes to addressing reoccurring security problems, known as vulnerabilities.
Coull, Natalie +3 more
core +2 more sources
One‐Dimensional Covalent Organic Framework: Synthesis and Photoelectronic Applications
The functional monomer structures, synthetic strategies, and the related applications of one‐dimensional covalent organic frameworks, as well as their current challenges and future development directions, have been summarized and prospected. One‐dimensional covalent organic frameworks (1D COFs) are linear porous materials constructed from organic units
Xuxin Fan +7 more
wiley +1 more source
Proposed Method to Prevent SQL Injection Attack
the internet and its websites have huge using these days. These webs may have sensitive and secret information like military information, financial information and other important information that transfer through the networks.
Makera Aziz, Dena Ahmed
doaj +1 more source
TopoMAS: Large Language Model Driven Topological Materials Multi‐Agent System
TopoMAS is an interactive multi‐agent framework that revolutionizes topological materials discovery through human–AI collaborative intelligence. The system integrates natural language processing, knowledge retrieval from literature and databases, crystal structure generation, and automated first‐principles calculations within a unified workflow.
Baohua Zhang +5 more
wiley +1 more source

