Results 101 to 110 of about 1,544,911 (270)

Models and scenarios of implementation of threats for internet resources

open access: yesРоссийский технологический журнал, 2020
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj   +1 more source

Preventing SQL Injection Attacks

open access: yesInternational Journal of Computer Applications, 2012
With the recent rapid increase in web based applications that employ back-end database services, results show that SQL Injection and Remote File Inclusion are the two frequently used exploits rather than using other complicated techniques. With the rise in use of web applications, SQL injection based attacks are gradually increasing and is now one of ...
Vaidhyanathan.G Vaidhyanathan.G   +2 more
openaire   +1 more source

Sagnac Interferometer as a Speed-Meter-Type, Quantum-Nondemolition Gravitational-Wave Detector

open access: yes, 2002
According to quantum measurement theory, "speed meters" -- devices that measure the momentum, or speed, of free test masses -- are immune to the standard quantum limit (SQL). It is shown that a Sagnac-interferometer gravitational-wave detector is a speed
A. Abramovici   +39 more
core   +1 more source

Algorithms and software solutions for SQL injection vulnerability testing in web applications

open access: yesВісник Національного технічного університету "ХПÌ": Системний аналіз, управління та інформаційні технології, 2018
Software security gains importance day by day and developers try to secure web applications as much as possible to protect confidentiality, integrity and availability that are described in the fundamental security model so-called CIA triad. SQL injection
Arslan Berk   +3 more
doaj   +1 more source

SQL Injection - Database Attack Revolution and Prevention [PDF]

open access: yes, 2011
SQL injection came with a bang and caused revolution in database attacking. In recent years, with the explosion in web-based commerce and information systems, databases have been drawing ever closer to the network and it is critical part of network ...
Dorai, R. (Ramakanth)   +1 more
core  

A Framework for Evaluation of SQL Injection Detection and Prevention Tools

open access: yesInternational Journal of Information and Communication Technology Research, 2013
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj  

Optimal configurations of filter cavity in future gravitational-wave detectors

open access: yes, 2010
Sensitivity of future laser interferometric gravitational-wave detectors can be improved using squeezed light with frequency-dependent squeeze angle and/or amplitude, which can be created using additional so-called filter cavities.
F. Ya. Khalili   +4 more
core   +1 more source

Using Links to prototype a Database Wiki [PDF]

open access: yes, 2011
Both relational databases and wikis have strengths that make them attractive for use in collaborative applications. In the last decade, database-backed Web applications have been used extensively to develop valuable shared biological references called ...
Cheney, James   +2 more
core   +1 more source

The AEI 10 m prototype interferometer [PDF]

open access: yes, 2010
A 10 m prototype interferometer facility is currently being set up at the AEI in Hannover, Germany. The prototype interferometer will be housed inside a 100 m^3 ultra-high vacuum envelope. Seismically isolated optical tables inside the vacuum system will
Chen, Yanbei, Goßler, S., Somiya, K.
core  

Home - About - Disclaimer - Privacy