Results 71 to 80 of about 23,541 (235)

Hydrothermally Induced Refractory DOC Sinks in the Deep Pacific Ocean

open access: yesGlobal Biogeochemical Cycles, Volume 39, Issue 9, September 2025.
Abstract Dissolved organic carbon (DOC) constitutes the largest pool of reduced carbon in the global ocean, with important contributions from both recently formed and aged, biologically refractory DOC (RDOC). The mechanisms regulating RDOC transformation and removal remain uncertain though hydrothermal vents have been identified as sources and sinks ...
D. A. Hansell   +6 more
wiley   +1 more source

Effective SQL Injection Detection: A Fusion of Binary Olympiad Optimizer and Classification Algorithm

open access: yesMathematics
Since SQL injection allows attackers to interact with the database of applications, it is regarded as a significant security problem. By applying machine learning algorithms, SQL injection attacks can be identified.
Bahman Arasteh   +3 more
doaj   +1 more source

Статический анализ кода мобильных приложений как средство выявления его уязвимостей [PDF]

open access: yes, 2015
В статье рассмотрен статический анализ исходного кода программ для мобильных платформ как одно из средств обеспечения безопасности мобильных систем. Проанализированы различные сценарии практического применения такого рода анализатора в качестве средства ...
Цыганенко, Никита Павлович
core  

Tempus: An Evolutionary Mutation Testing System on Event‐Based Systems With Profile‐Based Individual Generation

open access: yesSoftware Testing, Verification and Reliability, Volume 35, Issue 5, August 2025.
Tempus is a testing system that enhances Evolutionary Mutation Testing (EMT) by using ProfileBased individual generation (PBig). PBig generates new individuals based on previous knowledge from other programs about which operators are more likely to produce strong mutants.
Lorena Gutiérrez‐Madroñal   +2 more
wiley   +1 more source

ADAPT‐marketplace – A web‐application for XML‐based template sharing in radiation oncology

open access: yesJournal of Applied Clinical Medical Physics, Volume 26, Issue 7, July 2025.
Abstract Purpose The adaption of radiotherapy (RT) plans in response to anatomical and physiological changes during treatment marks a significant shift toward personalized cancer care. However, the complexity of Online Adaptive Radiotherapy (OART) procedures often leads to variability in treatment quality across institutions.
Dennis N. Stanley   +7 more
wiley   +1 more source

A semi‐automated workflow for cohort‐wise preparation of radiotherapy data for dose‐response modeling, including autosegmentation of organs at risk

open access: yesJournal of Applied Clinical Medical Physics, Volume 26, Issue 7, July 2025.
Abstract Background Preparing retrospective dose data for risk modeling using large study cohorts can be time consuming as it often requires patient‐wise manual interventions. This is especially the case when considering organs at risk (OARs) not systematically delineated historically.
Louise Mövik   +5 more
wiley   +1 more source

HYBRID INTRUSION DETECTION SYSTEM USING FUZZY LOGIC INFERENCE ENGINE FOR SQL INJECTION ATTACK

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2018
SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (
Rajif Agung Yunmar
doaj   +1 more source

Reaction to New Security Threat Class [PDF]

open access: yes, 2014
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core  

Sagnac Interferometer as a Speed-Meter-Type, Quantum-Nondemolition Gravitational-Wave Detector

open access: yes, 2002
According to quantum measurement theory, "speed meters" -- devices that measure the momentum, or speed, of free test masses -- are immune to the standard quantum limit (SQL). It is shown that a Sagnac-interferometer gravitational-wave detector is a speed
A. Abramovici   +39 more
core   +1 more source

SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks

open access: yesProcedia Computer Science, 2011
AbstractSecuring the web against frequent cyber attacks is a big concern as attackers usually intend to snitch private information, financial information, deface and damages websites to prove their hacking capabilities. This type of vandalism may drive many corporations that conduct their business through the web to suffer financial and reputation ...
Bashah Mat Ali, Abdul   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy