Results 61 to 70 of about 22,704 (203)

One‐Dimensional Covalent Organic Framework: Synthesis and Photoelectronic Applications

open access: yesAdvanced Energy and Sustainability Research, Volume 7, Issue 3, March 2026.
The functional monomer structures, synthetic strategies, and the related applications of one‐dimensional covalent organic frameworks, as well as their current challenges and future development directions, have been summarized and prospected. One‐dimensional covalent organic frameworks (1D COFs) are linear porous materials constructed from organic units
Xuxin Fan   +7 more
wiley   +1 more source

Proposed Method to Prevent SQL Injection Attack

open access: yesIraqi Journal for Computers and Informatics, 2016
the internet and its websites have huge using these days. These webs may have sensitive and secret information like military information, financial information and other important information that transfer through the networks.
Makera Aziz, Dena Ahmed
doaj   +1 more source

TopoMAS: Large Language Model Driven Topological Materials Multi‐Agent System

open access: yesMaterials Genome Engineering Advances, Volume 4, Issue 1, March 2026.
TopoMAS is an interactive multi‐agent framework that revolutionizes topological materials discovery through human–AI collaborative intelligence. The system integrates natural language processing, knowledge retrieval from literature and databases, crystal structure generation, and automated first‐principles calculations within a unified workflow.
Baohua Zhang   +5 more
wiley   +1 more source

Self‐Driving Development of Perfusion Processes for Monoclonal Antibody Production

open access: yesBiotechnology and Bioengineering, Volume 123, Issue 2, Page 391-405, February 2026.
ABSTRACT The development of autonomous agents in bioprocess development is crucial for advancing biopharma innovation. Time and resources required to develop and transfer a process for clinical material generation can be significantly decreased. While robotics and machine learning have greatly accelerated drug discovery and initial screening, the later
Chethana Janardhana Gadiyar   +10 more
wiley   +1 more source

Empowering Software Engineers to Design More Secure Web Applications: Guidelines and Potential of Using LLMs as a Recommender Tool

open access: yesJournal of Software: Evolution and Process, Volume 38, Issue 2, February 2026.
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner   +5 more
wiley   +1 more source

Using Nlp Techniques To Detect Sql Injection Attack

open access: yesمجلة جامعة دمشق للعلوم الهندسية, 2023
Most of the applications used on the internet are Web-Based Applications, that accept critical information from users and store this information in databases.
زاهر الشامي   +1 more
doaj  

Perancangan Keamanan Sistem Menggunakan Algoritma Honeypot pada Aplikasi Krs Online (Studi Kasus : Sekolah Tinggi Teknologi Adisutjipto) [PDF]

open access: yes, 2013
Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force.
Sajati, H. (Haruno)   +2 more
core  

QND measurements for future gravitational-wave detectors

open access: yes, 2010
Second-generation interferometric gravitational-wave detectors will be operating at the Standard Quantum Limit, a sensitivity limitation set by the trade off between measurement accuracy and quantum back action, which is governed by the Heisenberg ...
A. Buonanno   +41 more
core   +1 more source

SQLi‐ScanEval: A Framework for Design and Evaluation of SQLi Detection Using Vulnerability and Penetration Testing Scanners

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
This paper proposes SQLi‐ScanEval Framework, a standardized SQLi detection system that integrates vulnerability and penetration testing scanners into a standardized framework. It tested seven prominent SQLi vulnerability scanners including OWASP ZAP, Wapiti, Vega, Acunetix, Invicti, Burp Suite, and Arachni on two prominent vulnerable testing ...
Hajira Bashir   +6 more
wiley   +1 more source

SQLMVED: SQL injection runtime prevention system based on multi-variant execution

open access: yesTongxin xuebao, 2021
The effectiveness of combining SQL statement parsing with randomization to defend against SQL injection attack (SQLIA) was based on the fact that attackers did not know about the current method of randomization adopted by system.Therefore, once attackers
Bolin MA   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy