Results 101 to 110 of about 1,281,108 (372)
A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications [PDF]
This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database.
Adrian VISOIU, Silvia TRIF
core
Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro
The security aspect is often forgotten in the application of Information Technology. The attacks were caused by the negligence of the developer causes damage to the system used. SQL Injection attacks, Cross Site Scripting attacks, and no use of encrypted
Hilal Afrih Juhad+2 more
doaj +1 more source
Next‐Generation Image Sensors Based on Low‐Dimensional Semiconductor Materials
Low‐dimensional semiconductor materials are promising candidates for photosensitive components in next‐generation image sensors. This review offers a thorough and timely examination of novel image sensors, covering their working principles, intriguing materials categorized into four main groups, and advanced imaging applications.
Yunxia Hu+3 more
wiley +1 more source
Researching of Covert Timing Channels Based on HTTP Cache Headers in Web API
In this paper, it is shown how covert timing channels based on HTTP cache headers can be implemented using different Web API of Google Drive, Dropbox and Facebook Internet services.
Denis Nikolaevich Kolegov+2 more
doaj
This review systematically examines the nanomechanical mechanisms of mussel‐inspired molecular interactions, primarily investigated by direct force measurement techniques such as surface forces apparatus and atomic force microscopy. The macroscopic adhesive and self‐healing performances of mussel‐inspired functional materials, including coacervates ...
Pan Huang, Hongjian Zhang, Hongbo Zeng
wiley +1 more source
Web application security analysis using the Kali Linux operating system
The Kali Linux operating system is described as well as its purpose and possibilities. There are listed groups of tools that Kali Linux has together with the methods of their functioning, as well as a possibility to install and use tools that are not an ...
Ivan M. Babincev, Dejan Vuletić
semanticscholar +1 more source
Ionic Liquid‐Reinforced Multifunctional Hydrogel for the Treatment of Enterocutaneous Fistula
ECFGel is a multifunctional hydrogel engineered to treat infection‐associated ECFs. ECFGel demonstrates outstanding mechanical and biological properties, facilitating easy application, reliable occlusion, and sterilization, while promoting effective healing of infected fistula tracts.
Jinjoo Kim+7 more
wiley +1 more source
Paving the Way for Next‐Generation All‐Solid‐State Batteries: Dry Electrode Technology
The dry‐electrode process offers a highly efficient solution to the key challenges faced by all‐solid‐state batteries, including complex processing, high CO2 emissions, interfacial instability, toxicity, and limited energy density. This perspective outlines the critical challenges of implementing the dry electrode process from material fundamentals to ...
Junyoung Mun+3 more
wiley +1 more source
Systematic Review of Web Application Security Vulnerabilities Detection Methods
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an inappropriate ...
S. Rafique+4 more
semanticscholar +1 more source
A WebRTC Video Chat Implementation Within the Yioop Search Engine [PDF]
Web real-time communication (abbreviated as WebRTC) is one of the latest Web application technologies that allows voice, video, and data to work collectively in a browser without a need for third-party plugins or proprietary software installation.
Ho, Yangcha
core +1 more source