Coraza-Based WAF with OWASP CRS for SQL Injection in Multi-Domain Web System
This research aims to design and implement a Web Application Firewall (WAF) based on the OWASP Core Rule Set (CRS) to enhance web application protection against SQL Injection attacks.
Muhammad Zaedil +2 more
doaj +1 more source
A web services choreography scenario for interoperating bioinformatics applications
Background Very often genome-wide data analysis requires the interoperation of multiple databases and analytic tools. A large number of genome databases and bioinformatics applications are available through the web, but it is difficult to automate ...
Cheung David W +6 more
doaj +1 more source
Directed Security Policies: A Stateful Network Implementation
Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this
Carle, Georg +2 more
core +2 more sources
A Mobile Ambients-based Approach for Network Attack Modelling and Simulation [PDF]
Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through security perimeters and traverse a network to reach valuable assets deep inside the ...
Eck, Pascal van +3 more
core +2 more sources
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley +1 more source
An Effective Method to Safeguard Cyber Security by Preventing Malicious Data
In order to ensure the information security of a network, network security devices have been widely deployed in the information and communication network.
Guohua Wang +7 more
doaj +1 more source
Deliverable DJRA1.3: Tool prototype for creating and stitching multiple network resources for virtual infrastructures [PDF]
This document describes the prototype FEDERICA Slice Tool developed for the virtualization of network elements in FEDERICA and for creating and stitching network resources over this virtual infrastructure.
Cervelló Pastor, Cristina +2 more
core +1 more source
Presenting Clinical Features of Vitreoretinal Lymphoma
ABSTRACT Background Vitreoretinal lymphoma is a rare cancer, widely recognised to present diagnostic challenges. We aimed to report information that would support the clinician in considering this diagnosis. Methods We interrogated the International Vitreoretinal B‐Cell Lymphoma Registry for clinical data from patients newly diagnosed with ...
The International Vitreoretinal B‐Cell Lymphoma Registry Investigator Group +64 more
wiley +1 more source
Анализ и моделирование уязвимостей безопасности информационных систем
В статье рассматривается проблема уязвимости информационных систем к SQL-инъекциям, которые остаются одной из наиболее распространенных угроз для веб-приложений.
Б. С. Самандаров +2 more
doaj +1 more source

