Results 71 to 80 of about 23,541 (235)
Hydrothermally Induced Refractory DOC Sinks in the Deep Pacific Ocean
Abstract Dissolved organic carbon (DOC) constitutes the largest pool of reduced carbon in the global ocean, with important contributions from both recently formed and aged, biologically refractory DOC (RDOC). The mechanisms regulating RDOC transformation and removal remain uncertain though hydrothermal vents have been identified as sources and sinks ...
D. A. Hansell +6 more
wiley +1 more source
Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified.
Bahman Arasteh +3 more
doaj +1 more source
Статический анализ кода мобильных приложений как средство выявления его уязвимостей [PDF]
В статье рассмотрен статический анализ исходного кода программ для мобильных платформ как одно из средств обеспечения безопасности мобильных систем. Проанализированы различные сценарии практического применения такого рода анализатора в качестве средства ...
Цыганенко, Никита Павлович
core
Tempus is a testing system that enhances Evolutionary Mutation Testing (EMT) by using ProfileBased individual generation (PBig). PBig generates new individuals based on previous knowledge from other programs about which operators are more likely to produce strong mutants.
Lorena Gutiérrez‐Madroñal +2 more
wiley +1 more source
ADAPT‐marketplace – A web‐application for XML‐based template sharing in radiation oncology
Abstract Purpose The adaption of radiotherapy (RT) plans in response to anatomical and physiological changes during treatment marks a significant shift toward personalized cancer care. However, the complexity of Online Adaptive Radiotherapy (OART) procedures often leads to variability in treatment quality across institutions.
Dennis N. Stanley +7 more
wiley +1 more source
Abstract Background Preparing retrospective dose data for risk modeling using large study cohorts can be time consuming as it often requires patient‐wise manual interventions. This is especially the case when considering organs at risk (OARs) not systematically delineated historically.
Louise Mövik +5 more
wiley +1 more source
HYBRID INTRUSION DETECTION SYSTEM USING FUZZY LOGIC INFERENCE ENGINE FOR SQL INJECTION ATTACK
SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (
Rajif Agung Yunmar
doaj +1 more source
Reaction to New Security Threat Class [PDF]
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core
Sagnac Interferometer as a Speed-Meter-Type, Quantum-Nondemolition Gravitational-Wave Detector
According to quantum measurement theory, "speed meters" -- devices that measure the momentum, or speed, of free test masses -- are immune to the standard quantum limit (SQL). It is shown that a Sagnac-interferometer gravitational-wave detector is a speed
A. Abramovici +39 more
core +1 more source
SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
AbstractSecuring the web against frequent cyber attacks is a big concern as attackers usually intend to snitch private information, financial information, deface and damages websites to prove their hacking capabilities. This type of vandalism may drive many corporations that conduct their business through the web to suffer financial and reputation ...
Bashah Mat Ali, Abdul +3 more
openaire +2 more sources

