Results 21 to 30 of about 36,499 (202)

The medical science DMZ: a network design pattern for data-intensive medical science [PDF]

open access: yes, 2017
: Objective We describe a detailed solution for maintaining high-capacity, data-intensive network flows (eg, 10, 40, 100 Gbps+) in a scientific, medical context while still adhering to security and privacy laws and regulations. Materials and Methods
Balas, Edward   +8 more
core   +1 more source

Securing Web Application by Embedded Firewall

open access: yesElektronika ir Elektrotechnika, 2012
The paper addressed the problem of protection of Web applications. Classifications of Web application vulnerabilities and existing protection methods had been analyzed. The paper proposed an embedded web application firewall model based on a "black" and "white" lists of vulnerabilities which allows flexible and efficient development of Web applications
Kazanavicius, E.   +4 more
openaire   +2 more sources

SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall

open access: yesJOIV: International Journal on Informatics Visualization, 2018
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson   +2 more
doaj   +1 more source

Characterizations on microencapsulated sunflower oil as self-healing agent using In situ polymerization method [PDF]

open access: yes, 2020
This paper emphasizes the characterization on the microencapsulation of sunflower oil as self-healing agent. In-situ polymerization method mainly implicates in the microencapsulation process. The analysis of microencapsulated sunflower oil via prominent
Abdullah, H.Z.   +4 more
core   +1 more source

Web intrusion detection system combined with feature analysis and SVM optimization

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
The current network traffic is large, and the network attacks have multiple types. Therefore, anomaly detection model combined with machine learning is developing rapidly.
Chao Liu, Jing Yang, Jinqiu Wu
doaj   +1 more source

Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications

open access: yesSensors, 2023
The web application market has shown rapid growth in recent years. The expansion of Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) has created new web-based communication and sensing frameworks. Current security research utilizes source
Ankur Chowdhary   +2 more
doaj   +1 more source

Finding Efficiency Of Web Application Firewall

open access: yes, 2022
Abstract Today, with the Evolution of technology and tools like computer systems, mobiles, tablets pieces use these http as default protocol. The fact is a huge amount of data transactions are being processed due to these the http protocol. Because of this reason http protocol is becoming a target to attackers.
D.Naga Malleswari   +2 more
openaire   +1 more source

Applying Spring Security Framework with KeyCloak-Based OAuth2 to Protect Microservice Architecture APIs: A Case Study

open access: yesSensors, 2022
In this study, we implemented an integrated security solution with Spring Security and Keycloak open-access platform (SSK) to secure data collection and exchange over microservice architecture application programming interfaces (APIs).
Ayan Chatterjee, Andreas Prinz
doaj   +1 more source

Ethical Precision in Nanoscale Brain Interfacing

open access: yesAdvanced Science, EarlyView.
As brain interfaces approach the nanoscale, precision no longer only measures—it knows, predicts, and potentially reshapes the mind. This work argues that traditional ethics fails under such conditions and proposes a shift toward continuous, operation‐based governance using the recovery–discovery framework to track, constrain, and responsibly steer ...
Guilherme Wood
wiley   +1 more source

Development of the security monitoring system for cluster of information systems based on the Ruby on Rails framework

open access: yesБезопасность информационных технологий, 2018
Currently, the information environment of many large organizations is  represented by a cluster of web-oriented information systems. Often these information systems are based on the Ruby on Rails framework.
David A. Khotelov   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy