Results 61 to 70 of about 36,499 (202)

Coraza-Based WAF with OWASP CRS for SQL Injection in Multi-Domain Web System

open access: yesJournal of Information Systems and Informatics
This research aims to design and implement a Web Application Firewall (WAF) based on the OWASP Core Rule Set (CRS) to enhance web application protection against SQL Injection attacks.
Muhammad Zaedil   +2 more
doaj   +1 more source

A web services choreography scenario for interoperating bioinformatics applications

open access: yesBMC Bioinformatics, 2004
Background Very often genome-wide data analysis requires the interoperation of multiple databases and analytic tools. A large number of genome databases and bioinformatics applications are available through the web, but it is difficult to automate ...
Cheung David W   +6 more
doaj   +1 more source

Directed Security Policies: A Stateful Network Implementation

open access: yes, 2014
Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this
Carle, Georg   +2 more
core   +2 more sources

A Mobile Ambients-based Approach for Network Attack Modelling and Simulation [PDF]

open access: yes, 2009
Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through security perimeters and traverse a network to reach valuable assets deep inside the ...
Eck, Pascal van   +3 more
core   +2 more sources

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley   +1 more source

An Effective Method to Safeguard Cyber Security by Preventing Malicious Data

open access: yesIEEE Access, 2019
In order to ensure the information security of a network, network security devices have been widely deployed in the information and communication network.
Guohua Wang   +7 more
doaj   +1 more source

Deliverable DJRA1.3: Tool prototype for creating and stitching multiple network resources for virtual infrastructures [PDF]

open access: yes, 2010
This document describes the prototype FEDERICA Slice Tool developed for the virtualization of network elements in FEDERICA and for creating and stitching network resources over this virtual infrastructure.
Cervelló Pastor, Cristina   +2 more
core   +1 more source

Presenting Clinical Features of Vitreoretinal Lymphoma

open access: yesClinical &Experimental Ophthalmology, EarlyView.
ABSTRACT Background Vitreoretinal lymphoma is a rare cancer, widely recognised to present diagnostic challenges. We aimed to report information that would support the clinician in considering this diagnosis. Methods We interrogated the International Vitreoretinal B‐Cell Lymphoma Registry for clinical data from patients newly diagnosed with ...
The International Vitreoretinal B‐Cell Lymphoma Registry Investigator Group   +64 more
wiley   +1 more source

Анализ и моделирование уязвимостей безопасности информационных систем

open access: yesИнформатика. Экономика. Управление
В статье рассматривается проблема уязвимости информационных систем к SQL-инъекциям, которые остаются одной из наиболее распространенных угроз для веб-приложений.
Б. С. Самандаров   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy