Results 101 to 110 of about 1,346,069 (376)
Researching of Covert Timing Channels Based on HTTP Cache Headers in Web API
In this paper, it is shown how covert timing channels based on HTTP cache headers can be implemented using different Web API of Google Drive, Dropbox and Facebook Internet services.
Denis Nikolaevich Kolegov +2 more
doaj
EmintWeb: Creation of embedded web applications in C++ for specific systems
Most contemporary web applications are primarily coded in interpreted languages (JavaScript, PHP, Python...) and are initiated by the web server. This requires solving the persistence issue: HTTP/HTTPS is a stateless protocol but user identity and ...
Juan Domingo +2 more
doaj +1 more source
Dry electrode technology revolutionizes battery manufacturing by eliminating toxic solvents and energy‐intensive drying. This work details two promising techniques: dry spray deposition and polymer fibrillation. How their unique solvent‐free bonding mechanisms create uniform microstructures for thicker, denser electrodes, boosting energy density and ...
Yuhao Liang +7 more
wiley +1 more source
Models and scenarios of implementation of threats for internet resources
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj +1 more source
Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro
The security aspect is often forgotten in the application of Information Technology. The attacks were caused by the negligence of the developer causes damage to the system used. SQL Injection attacks, Cross Site Scripting attacks, and no use of encrypted
Hilal Afrih Juhad +2 more
doaj +1 more source
An injectable deep eutectic solvent‐based ionic gel is developed for rapid in situ gelation and broad‐spectrum hemostatic functionality. The material combines high mechanical strength, strong tissue adhesion, and antibacterial activity, demonstrating potential as an advanced biofunctional gel for emergency bleeding control and wound care.
Jia‐Yu Yang +13 more
wiley +1 more source
Web application security analysis using the Kali Linux operating system
The Kali Linux operating system is described as well as its purpose and possibilities. There are listed groups of tools that Kali Linux has together with the methods of their functioning, as well as a possibility to install and use tools that are not an ...
Ivan M. Babincev, Dejan Vuletić
semanticscholar +1 more source
Progressive Insights into 3D Bioprinting for Corneal Tissue Restoration
This review explores the potential of 3D bioprinting to replicate the complex structure and function of the human cornea. It highlights key advances in bioink development, printing modalities, and in vivo performance, while addressing current challenges and emerging strategies. The review emphasizes bioprinting's promise to overcome donor shortages and
Ilayda Namli +6 more
wiley +1 more source
Information security can no longer be neglected in any area. It is a concern to everyone and every organization. This is particularly important in the finance sector, not only because the financial amounts involved but also clients and organization’s private and sensitive information. As a way to test security in infrastructures, networks, deployed web
Vieira, T., Serrão, C.
openaire +3 more sources
Systematic Review of Web Application Security Vulnerabilities Detection Methods
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate ...
S. Rafique +4 more
semanticscholar +1 more source

