Results 91 to 100 of about 787,843 (284)

Study of Free‐Space Optical Quantum Network: Review and Prospectives

open access: yesAdvanced Science, EarlyView.
Free from the constraints of fiber connections, free‐space quantum network enables longer and more flexible quantum network connections. This review summarizes and comparatively analyzes free‐space quantum network experiments based on ground stations, satellites, and mobile platforms.
Hua‐Ying Liu, Zhenda Xie, Shining Zhu
wiley   +1 more source

APPLYING OF ATTACK TREES FOR ESTIMATION THE PROBABILITY OF A SUCCESSFUL ATTACK OF THE WEB-APPLICATION

open access: yesРадіоелектронні і комп'ютерні системи, 2018
The development of technologies leads to the expansion of the range of services provided on the Internet, the online business is actively developing. As a rule, when creating a new Web resource for business, the main emphasis is on the need to stand out ...
Артём Григорьевич Тецкий
doaj   +1 more source

SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]

open access: yes, 2018
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core   +1 more source

Leveraging Artificial Intelligence and Large Language Models for Cancer Immunotherapy

open access: yesAdvanced Science, EarlyView.
Cancer immunotherapy faces challenges in predicting treatment responses and understanding resistance mechanisms. Artificial intelligence (AI) and machine learning (ML) offer powerful solutions for cancer immunotherapy in patient stratification, biomarker discovery, treatment strategy optimization, and foundation model development.
Xinchao Wu   +4 more
wiley   +1 more source

SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall

open access: yesJOIV: International Journal on Informatics Visualization, 2018
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson   +2 more
doaj   +1 more source

Security Aspects in Modern Web Applications [PDF]

open access: yes, 2009
World Wide Webin taustalla olevat tekniikat kehitettiin alun perin helpottamaan tiedon jakamista. Tämä jaettu tieto oli aluksi muuttumatonta tai harvoin muuttuvaa, mutta webin yleistyminen muutti tilanteen.
Miettinen, Jarkko
core  

Adult Sex Ratio as a Demographic Feedback Linking Mating Systems, Parental Care, and Evolution

open access: yesAdvanced Science, EarlyView.
Breeding systems are some of the most diverse social behavior, and our team is investigation the evolutionary causes of this diversity. This review summarises our research carried out at the University of Bath. We argue that demographic components of wild populations, especially the adult sex ratio, plays a key role driving breeding system variation ...
Tamás Székely, Oscar G. Miranda
wiley   +1 more source

BrowserAudit: Automated testing of browser security features

open access: yes, 2015
The security of the client side of a web application relies on browser features such as cookies, the same-origin policy and HTTPS. As the client side grows increasingly powerful and sophisticated, browser vendors have stepped up their offering of ...
Barth A.   +6 more
core   +1 more source

Optimal Grazing Exclusion Duration to Enhance Soil Carbon Sequestration in Degraded Grasslands

open access: yesAdvanced Science, EarlyView.
Across China, grazing exclusion reaches the national mean soil organic carbon recovery benchmark sooner in high‐MAP regions (> 500 mm), but recovery is much slower where MAP < 300 mm. Scaling this strategy to 70% of China's degraded grasslands would sequester about 1.52 Pg of soil carbon over 10 years—roughly 17% of annual global fossil‐fuel emissions.
Bin Zhang   +9 more
wiley   +1 more source

Applying Real Options Thinking to Information Security in Networked Organizations [PDF]

open access: yes, 2006
An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets.
Daneva, M.
core   +2 more sources

Home - About - Disclaimer - Privacy