Results 31 to 40 of about 22,704 (203)

Amplitude noise reduction in semiconductor lasers with weak, dispersive optical feedback [PDF]

open access: yes, 1994
We present the theory and measurements of the amplitude noise spectrum from a semiconductor laser with weak optical feedback (Pfb/Pout ~10^-6) from an external cavity containing an element of dispersive loss.
Boyd, R.   +3 more
core   +1 more source

Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security [PDF]

open access: yesITM Web of Conferences
A pervasive security issue in web applications is database injection, enabling attackers to alter SQL queries in order to get unauthorized access to confidential information.
Lu Zhexi
doaj   +1 more source

A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm

open access: yesEURASIP Journal on Information Security, 2020
Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy ...
Oluwakemi Christiana Abikoye   +4 more
doaj   +1 more source

Living City, A Collaborative Browser-Based Massively Multiplayer Online Game [PDF]

open access: yes, 2010
This work presents the design and implementation of our Browser-based Massively Multiplayer Online Game, Living City, a simulation game fully developed at the University of Messina.
Ferrara, Emilio   +2 more
core   +2 more sources

Analisis Efektivitas Tools SQLMap, Havij dan Ghauri dalam Melakukan Serangan SQL Injection pada Website

open access: yesJournal of Internet and Software Engineering
Website merupakan kumpulan halaman yang menampilkan informasi yang bersifat statis maupun dinamis. Seiring dengan perkembangan website, website tidak sekedar menjadi media informasi saja melainkan juga sebagai e-commerce, media sharing, platform e ...
Difa Maulana, Alif Subardono
doaj   +1 more source

Conversion of conventional gravitational-wave interferometers into QND interferometers by modifying their input and/or output optics [PDF]

open access: yes, 2000
The LIGO-II gravitational-wave interferometers (ca. 2006--2008) are designed to have sensitivities at about the standard quantum limit (SQL) near 100 Hz. This paper describes and analyzes possible designs for subsequent, LIGO-III interferometers that can
A. Dorsel   +47 more
core   +3 more sources

Provably throttling SQLI using an enciphering query and secure matching

open access: yesEgyptian Informatics Journal, 2022
Web applications, which dominate the internet, act as communication media between customers and service providers. Web applications are an internet innovation that provide customer services such as e-banking, e-commerce and e-booking.
Mohammed Abdulridha Hussain   +7 more
doaj   +1 more source

Force stimulation promotes nerve regeneration by restoring cellular energy

open access: yesBMEMat, EarlyView.
Mechanical stimulation can help nerves regenerate in various ways. We developed two devices (a piezo‐motor‐driven stretching device and a SAW‐based actuator) to apply mechanical stimulation to sciatic nerve and DRG neurons. Our study shows that appropriate mechanical force stimulation can promote regeneration by restoring the energy supply to the ...
Zhe Wang   +10 more
wiley   +1 more source

Image and video analysis using graph neural network for Internet of Medical Things and computer vision applications

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Graph neural networks (GNNs) have revolutionised the processing of information by facilitating the transmission of messages between graph nodes. Graph neural networks operate on graph‐structured data, which makes them suitable for a wide variety of computer vision problems, such as link prediction, node classification, and graph classification.
Amit Sharma   +4 more
wiley   +1 more source

Systematic literature review on SQL injection attack [PDF]

open access: yes, 2016
SQL injection attack is a common threat to web applications that utilizes poor input validation to implement attack on a target database. It is becoming a very serious problem in web applications as successful execution leads to loss of integrity and ...
Aminu, Lawal Muhammad   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy