Results 111 to 120 of about 781,799 (337)
General aspects of application it security [PDF]
To achieve a satisfactory level of security of an information system, different system and application methods are applied. The paper has a focus on general aspects of application IT security, thereby giving an overview of security methods applied to the
Čisar Petar
doaj
Development of Content Security Policy Detection and Reporting Web Application
Mahwish Naz, Kilhung Lee
openalex +2 more sources
SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core +1 more source
This review highlights submicron patterning strategies for metal halide perovskites, focusing on solvent compatibility, resolution, and alignment toward scalable integration in advanced optoelectronic systems. Abstract Halide perovskites are promising materials for future optoelectronic and display systems.
Dante Ahn +4 more
wiley +1 more source
Pengembangan Sistem Keamanan Untuk Toko Online Berbasis Kriptografi Aes Menggunakan Bahasa Pemrograman Php Dan Mysql [PDF]
Online Shop Security System based AES Cryptography is an application in the form of an online store website that was developed to improve safety and comfort for the user.
Candra, B. (Benni) +2 more
core
Vat Photopolymerized HEMA/HEA Hydrogels for Solvent‐Responsive Transparency and Optical Encryption
Vat‐photopolymerized HEMA/HEA hydrogels exhibit reversible transparency‐opacity switching via hydration‐induced microphase separation and solvent exchange. The printed materials enable hydration sensing, optical encryption, and information storage, while maintaining high ductility and reversible rheology.
Murad Ali +4 more
wiley +1 more source
A Novel Vapt Algorithm: Enhancing Web Application Security Trough OWASP Top 10 Optimization
Rui Ventura +2 more
openalex +1 more source
Flexible Sensor‐Based Human–Machine Interfaces with AI Integration for Medical Robotics
This review explores how flexible sensing technology and artificial intelligence (AI) significantly enhance human–machine interfaces in medical robotics. It highlights key sensing mechanisms, AI‐driven advancements, and applications in prosthetics, exoskeletons, and surgical robotics.
Yuxiao Wang +5 more
wiley +1 more source
Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review
Web 3.0 marks the beginning of a new era for the internet, characterized by distributed technology that prioritizes data ownership and value expression. Web 3.0 aims to empower users by providing them with ownership and control of their data and digital ...
Bandar Alotaibi
doaj +1 more source

