Results 91 to 100 of about 1,062,697 (366)
Towards Secure SPARQL Queries in Semantic Web Applications using PHP (Extended Version) [PDF]
The Semantic Web (SW) is a significant advancement in the field of Internet technologies and an uncharted territory as far as security is concerned. In this paper we investigate and assess the impact of known attacks of SPARQL/SPARUL injections on Semantic Web applications developed in PHP.
arxiv
MaTableGPT: GPT‐Based Table Data Extractor from Materials Science Literature
A significant challenge in materials informatics today is the creation of large‐scale experimental databases. This difficulty primarily stems from the complexities involved in consolidating locally distributed datasets from various laboratories into a single cohesive database.
Gyeong Hoon Yi+11 more
wiley +1 more source
Honeypot through Web (Honeyd@WEB): The Emerging of Security Application Integration [PDF]
Nor Badrul Anuar Jumaat+2 more
openalex +2 more sources
Researching of Covert Timing Channels Based on HTTP Cache Headers in Web API
In this paper, it is shown how covert timing channels based on HTTP cache headers can be implemented using different Web API of Google Drive, Dropbox and Facebook Internet services.
Denis Nikolaevich Kolegov+2 more
doaj
Can I Take Your Subdomain? Exploring Related-Domain Attacks in the Modern Web [PDF]
Related-domain attackers control a sibling domain of their target web application, e.g., as the result of a subdomain takeover. Despite their additional power over traditional web attackers, related-domain attackers received only limited attention by the research community.
arxiv
DPImpute is a two‐step pipeline that outperforms existing tools in whole‐genome SNP imputation, particularly under conditions of ultra‐low coverage sequencing, small sample sizes, and limited references. It enables precise imputation for single blastocyst cells, supporting genomic selection at the pre‐implantation stage.
Weigang Zheng+11 more
wiley +1 more source
Today we live in a society that we call the information society where information has become a resource of great value. Along with this kind of society web applications that provide information through various services have appeared. Web applications have been driven to the point of very high visual appearance and services quality level but the part ...
Konecki, Mario+2 more
openaire +1 more source
Web application security analysis using the Kali Linux operating system
The Kali Linux operating system is described as well as its purpose and possibilities. There are listed groups of tools that Kali Linux has together with the methods of their functioning, as well as a possibility to install and use tools that are not an ...
Ivan M. Babincev, Dejan Vuletić
semanticscholar +1 more source
Low‐Irradiance Antimicrobial Blue Light‐Bathing Therapy for Wound Infection Control
Antimicrobial blue light has been shown as an appealing non‐pharmacological antimicrobial alternative. However, its clinical applications have been hindered by high irradiance‐associated photothermal risks. In this work, a low‐irradiance blue light‐bathing concept and a wearable photonic wound patch are established to address this challenge in terms of
Jie Hui+12 more
wiley +1 more source
Systematic Review of Web Application Security Vulnerabilities Detection Methods
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate ...
S. Rafique+4 more
semanticscholar +1 more source