Results 41 to 50 of about 36,499 (202)
A Web-Based Honeypot in IPv6 to Enhance Security
IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet.
Keyong Wang +3 more
doaj +1 more source
Associating cognitive abilities with naturalistic search behavior
Abstract Differences in cognitive abilities affect search behaviors, but this has mostly been observed in laboratory experiments. There is limited research on how users search for information in real‐world, naturalistic settings and how real‐world search behaviors relate to cognitive abilities.
Tung Vuong +2 more
wiley +1 more source
Analisis Keamanan Website Open Journal System Menggunakan Metode Vulnerability Assessment
Open Journal System (OJS) merupakan perangkat lunak yang berfungsi sebagai sarana publikasi ilmiah dan digunakan diseluruh dunia. OJS yang tidak dipantau beresiko diserang oleh hacker.
Imam Riadi, Anton Yudhana, Yunanri W
doaj +1 more source
Centralized Web Application Firewall Security System
In this paper we propose a centralized web firewall system for web application security which will provide a new type of synchronized system, which has the ability to detect and prevent a variety of web application attacks for a wide range of hosts at the same time , using an centralized command and control system, the attacked ...
Saher Manaseer, Ahmad K. Al Hwaitat
openaire +2 more sources
Corporate Decarbonization via Technology and Management
ABSTRACT This study provides a comprehensive overview of key findings on decarbonization, advanced technologies, and management strategies, highlighting emerging themes shaping the field. Advanced technologies enhance carbon reduction through efficiency, real‐time monitoring, and optimizing resource optimization.
Heidy Montero‐Teran +2 more
wiley +1 more source
A Multi-Source Feedback-Driven Framework for Generating WAF Test Cases
Web application firewalls (WAFs) are critical defenses against persistent threats to web applications, yet their security evaluation remains challenging.
Pengcheng Lu +3 more
doaj +1 more source
Machine Learning Blunts the Needle of Advanced SQL Injections
SQL injection is one of the most popular and serious information security threats. By exploiting database vulnerabilities, attackers may get access to sensitive data or enable compromised computers to conduct further network attacks.
Marina Volkova +2 more
doaj +1 more source
Defending Against Denial of Service [PDF]
Civil Society currently faces significant cyber threats. At the top of the list of those threats are Denial of Service (DoS) attacks. The websites of many organizations and individuals have already come under such attacks, and the frequency of those ...
core
Risks and remedies in e-learning system
One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher ...
Barik, Nikhilesh, Karforma, Sunil
core +1 more source
A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets [PDF]
open access articleThe Internet of Things (IoT) introduced the opportunity of remotely manipulating home appliances (such as heating systems, ovens, blinds, etc.) using computers and mobile devices.
Cruz, Bruno +5 more
core +1 more source

