Results 41 to 50 of about 23,541 (235)

Open‐Source System Suitability: Mass Spectrometry Query Language Lab (MassQLab)

open access: yesRapid Communications in Mass Spectrometry, Volume 39, Issue 23, 15 December 2025.
ABSTRACT Rationale Reproducible analytical instrumentation system performance is critical for mass spectrometry, particularly metabolomics, aptly named system suitability testing. We identified a need based on literature reports that stated only 2% of papers performed system suitability testing.
Heather L. Winter   +2 more
wiley   +1 more source

SIDNet: A SQL Injection Detection Network for Enhancing Cybersecurity

open access: yesIEEE Access
SQL (Structured Query Language) injection is one of the most prevalent and dangerous forms of cyber-attacks, posing significant threats to database management systems and the overall security of web applications.
Debendra Muduli   +6 more
doaj   +1 more source

A SQL Injection Detection Method Based on Adaptive Deep Forest

open access: yesIEEE Access, 2019
Injection attack is the first of the top 10 security threats announced by the OWASP. Meanwhile, SQL injection is one of the most important types among the injection attacks.
Qi Li   +3 more
doaj   +1 more source

Quantum noise in gravitational-wave interferometers: Overview and recent developments [PDF]

open access: yes, 2003
We present an overview of quantum noise in gravitational wave interferometers. Gravitational wave detectors are extensively modified variants of a Michelson interferometer and the quantum noise couplings are strongly influenced by the interferometer ...
Corbitt, Thomas, Mavalvala, Nergis
core   +4 more sources

Regional Differences in Soybean Protein and Amino Acid Profiles: A Genetic Exploration Using a Novel GWAS Panel

open access: yesLegume Science, Volume 7, Issue 4, December 2025.
ABSTRACT Regional differences in soybean seed protein and amino acid content in Canada present significant challenges for crop improvement and the market value of high‐protein livestock feed. This study employed genome‐wide association studies (GWAS) using a novel panel of 206 cultivars to investigate the genetic basis of regional variations.
Siwar Haidar   +19 more
wiley   +1 more source

Tool for SQL Injection Vulnerability Detection [PDF]

open access: yes, 2013
Bakalářská práce je zaměřena na problematiku bezpečnostní chyby SQL injection. V práci jsou popsány běžně používané postupy při útocích na informační systémy a jsou také probrány možnosti obrany včetně uvedení způsobů správné validace vstupů aplikace ...
Kutypa, Matouš
core  

Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application [PDF]

open access: yes, 2016
SQL injection Hotspots (SQLiHs) are Application’s Entry Points (AEPs) through which SQL injection is possible, subject to the application’s internal sanitization or validation capabilities.
Abdullah @ Selimun, Mohd Taufik   +4 more
core   +1 more source

Modular architecture for traffic monitoring systems using 3D LiDAR sensors

open access: yesComputer-Aided Civil and Infrastructure Engineering, Volume 40, Issue 30, Page 5972-5990, 19 December 2025.
Abstract Urban growth has generated an increasing demand for robust and accurate traffic monitoring systems. Traditional technologies such as inductive loops and computer vision have limitations under adverse environmental conditions and in high‐density traffic scenarios.
A. Cruz   +3 more
wiley   +1 more source

A Survey on SQL Injection Attacks Types & their Prevention Techniques

open access: yesJISR on Computing, 2023
In the world of connectedness even more than ever before we are using digital technologies in daily life from bank transactions to social networking.
Jibran Rasheed Khan   +2 more
doaj   +1 more source

A Comprehensive Survey on LLM‐Based Network Management and Operations

open access: yesInternational Journal of Network Management, Volume 35, Issue 6, November/December 2025.
ABSTRACT The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule‐based methods, adopting advanced artificial intelligence (AI)‐driven
Jibum Hong   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy