Results 91 to 100 of about 1,281,108 (372)

SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall

open access: yesJOIV: International Journal on Informatics Visualization, 2018
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson   +2 more
doaj   +1 more source

Models and scenarios of implementation of threats for internet resources

open access: yesРоссийский технологический журнал, 2020
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj   +1 more source

Robust Full‐Surface Bonding of Substrate and Electrode for Ultra‐Flexible Sensor Integration

open access: yesAdvanced Materials, EarlyView.
A direct hybrid bonding method that enables both gold and parylene bonding without adhesives is developed. This technique achieves full‐surface direct bonding of electrodes and substrates in flexible electronic connections. The method offers high flexibility, stable mechanical durability, and high‐resolution interconnections, accommodating varying ...
Masahito Takakuwa   +9 more
wiley   +1 more source

Policy-agnostic programming on the client-side [PDF]

open access: yes, 2017
Browser security has become a major concern especially due to web pages becoming more complex. These web applications handle a lot of information, including sensitive data that may be vulnerable to attacks like data exfiltration, cross-site scripting ...
Palesha, Kushal
core   +1 more source

An efficient deception architecture for cloud-based virtual networks

open access: yesKuwait Journal of Science, 2019
Emerging deceptive systems present a new promise for the uprising security problems in cloud-based virtual networks, especially those operated by small and medium enterprises. The main goal of deceptive systems is to form a layer of defensive nodes in an
Mohammad Qasem, Hussain M J Almohri
doaj  

Implementasi JSON Web Token Berbasis Algoritma SHA-512 untuk Otentikasi Aplikasi BatikKita

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2020
Batikkita is an android based application and web framework laravel web service architecture that is used to bring together between craftsmen and consumers of batik Trusmi and batikkita application with the e-commerce model used is business to customer ...
Andi Setiawan, Ade Irma Purnamasari
doaj   +1 more source

Inorganic Dielectric Materials Coupling Micro‐/Nanoarchitectures for State‐of‐the‐Art Biomechanical‐to‐Electrical Energy Conversion Devices

open access: yesAdvanced Materials, EarlyView.
Biomechanical‐to‐electrical energy conversion devices are uniquely suited for self‐driven physiological information monitoring and powering human–computer interaction systems. These devices based on micro‐/nanoarchitectured inorganic dielectric materials (MNIDMs) have shown ultrahigh electromechanical performance and thus great potential for practical ...
Jia‐Han Zhang   +12 more
wiley   +1 more source

Materials Advances in Devices for Heart Disease Interventions

open access: yesAdvanced Materials, EarlyView.
This review examines the crucial role of materials in heart disease interventions, focusing on strategies for monitoring, managing, and repairing heart conditions. It discusses the material requirements for medical devices, highlighting recent innovations and their impact on cardiovascular health.
Gagan K. Jalandhra   +11 more
wiley   +1 more source

Secure Web Applications?

open access: yes, 2007
Today we live in a society that we call the information society where information has become a resource of great value. Along with this kind of society web applications that provide information through various services have appeared. Web applications have been driven to the point of very high visual appearance and services quality level but the part ...
Konecki, Mario   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy