Results 21 to 30 of about 36,499 (202)
The medical science DMZ: a network design pattern for data-intensive medical science [PDF]
: Objective We describe a detailed solution for maintaining high-capacity, data-intensive network flows (eg, 10, 40, 100 Gbps+) in a scientific, medical context while still adhering to security and privacy laws and regulations. Materials and Methods
Balas, Edward +8 more
core +1 more source
Securing Web Application by Embedded Firewall
The paper addressed the problem of protection of Web applications. Classifications of Web application vulnerabilities and existing protection methods had been analyzed. The paper proposed an embedded web application firewall model based on a "black" and "white" lists of vulnerabilities which allows flexible and efficient development of Web applications
Kazanavicius, E. +4 more
openaire +2 more sources
SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson +2 more
doaj +1 more source
Characterizations on microencapsulated sunflower oil as self-healing agent using In situ polymerization method [PDF]
This paper emphasizes the characterization on the microencapsulation of sunflower oil as self-healing agent. In-situ polymerization method mainly implicates in the microencapsulation process. The analysis of microencapsulated sunflower oil via prominent
Abdullah, H.Z. +4 more
core +1 more source
Web intrusion detection system combined with feature analysis and SVM optimization
The current network traffic is large, and the network attacks have multiple types. Therefore, anomaly detection model combined with machine learning is developing rapidly.
Chao Liu, Jing Yang, Jinqiu Wu
doaj +1 more source
Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications
The web application market has shown rapid growth in recent years. The expansion of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) has created new web-based communication and sensing frameworks. Current security research utilizes source
Ankur Chowdhary +2 more
doaj +1 more source
Finding Efficiency Of Web Application Firewall
Abstract Today, with the Evolution of technology and tools like computer systems, mobiles, tablets pieces use these http as default protocol. The fact is a huge amount of data transactions are being processed due to these the http protocol. Because of this reason http protocol is becoming a target to attackers.
D.Naga Malleswari +2 more
openaire +1 more source
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs).
Ayan Chatterjee, Andreas Prinz
doaj +1 more source
Ethical Precision in Nanoscale Brain Interfacing
As brain interfaces approach the nanoscale, precision no longer only measures—it knows, predicts, and potentially reshapes the mind. This work argues that traditional ethics fails under such conditions and proposes a shift toward continuous, operation‐based governance using the recovery–discovery framework to track, constrain, and responsibly steer ...
Guilherme Wood
wiley +1 more source
Currently, the information environment of many large organizations is represented by a cluster of web-oriented information systems. Often these information systems are based on the Ruby on Rails framework.
David A. Khotelov +4 more
doaj +1 more source

