Results 101 to 110 of about 1,346,069 (376)

Researching of Covert Timing Channels Based on HTTP Cache Headers in Web API

open access: yesБезопасность информационных технологий, 2015
In this paper, it is shown how covert timing channels based on HTTP cache headers can be implemented using different Web API of Google Drive, Dropbox and Facebook  Internet services.
Denis Nikolaevich Kolegov   +2 more
doaj  

EmintWeb: Creation of embedded web applications in C++ for specific systems

open access: yesSoftwareX
Most contemporary web applications are primarily coded in interpreted languages (JavaScript, PHP, Python...) and are initiated by the web server. This requires solving the persistence issue: HTTP/HTTPS is a stateless protocol but user identity and ...
Juan Domingo   +2 more
doaj   +1 more source

Solvent‐Free Bonding Mechanisms and Microstructure Engineering in Dry Electrode Technology for Lithium‐Ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
Dry electrode technology revolutionizes battery manufacturing by eliminating toxic solvents and energy‐intensive drying. This work details two promising techniques: dry spray deposition and polymer fibrillation. How their unique solvent‐free bonding mechanisms create uniform microstructures for thicker, denser electrodes, boosting energy density and ...
Yuhao Liang   +7 more
wiley   +1 more source

Models and scenarios of implementation of threats for internet resources

open access: yesРоссийский технологический журнал, 2020
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj   +1 more source

Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro

open access: yesJurnal Teknologi dan Sistem Komputer, 2016
The security aspect is often forgotten in the application of Information Technology. The attacks were caused by the negligence of the developer causes damage to the system used. SQL Injection attacks, Cross Site Scripting attacks, and no use of encrypted
Hilal Afrih Juhad   +2 more
doaj   +1 more source

Injectable Deep Eutectic Solvent‐Based Ionic Gel With Rapid Gelation and Broad Hemostatic Functionality

open access: yesAdvanced Healthcare Materials, EarlyView.
An injectable deep eutectic solvent‐based ionic gel is developed for rapid in situ gelation and broad‐spectrum hemostatic functionality. The material combines high mechanical strength, strong tissue adhesion, and antibacterial activity, demonstrating potential as an advanced biofunctional gel for emergency bleeding control and wound care.
Jia‐Yu Yang   +13 more
wiley   +1 more source

Web application security analysis using the Kali Linux operating system

open access: yes, 2016
The Kali Linux operating system is described as well as its purpose and possibilities. There are listed groups of tools that Kali Linux has together with the methods of their functioning, as well as a possibility to install and use tools that are not an ...
Ivan M. Babincev, Dejan Vuletić
semanticscholar   +1 more source

Progressive Insights into 3D Bioprinting for Corneal Tissue Restoration

open access: yesAdvanced Healthcare Materials, EarlyView.
This review explores the potential of 3D bioprinting to replicate the complex structure and function of the human cornea. It highlights key advances in bioink development, printing modalities, and in vivo performance, while addressing current challenges and emerging strategies. The review emphasizes bioprinting's promise to overcome donor shortages and
Ilayda Namli   +6 more
wiley   +1 more source

Web Applications Security and Vulnerability Analysis Financial Web Applications Security Audit – A Case Study

open access: yesInternational Journal of Innovative Business Strategies, 2016
Information security can no longer be neglected in any area. It is a concern to everyone and every organization. This is particularly important in the finance sector, not only because the financial amounts involved but also clients and organization’s private and sensitive information. As a way to test security in infrastructures, networks, deployed web
Vieira, T., Serrão, C.
openaire   +3 more sources

Systematic Review of Web Application Security Vulnerabilities Detection Methods

open access: yes, 2015
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate ...
S. Rafique   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy