Results 111 to 120 of about 1,062,697 (366)
Information security can no longer be neglected in any area. It is a concern to everyone and every organization. This is particularly important in the finance sector, not only because the financial amounts involved but also clients and organization’s private and sensitive information. As a way to test security in infrastructures, networks, deployed web
Vieira, T., Serrão, C.
openaire +3 more sources
PROP - Patronage of PHP Web Applications [PDF]
PHP is one of the most commonly used languages to develop web sites because of its simplicity, easy to learn and it can be easily embedded with any of the databases. A web developer with his basic knowledge developing an application without practising secure guidelines, improper validation of user inputs leads to various source code vulnerabilities ...
arxiv
Wireless Technologies for Wearable Electronics: A Review
This review discusses recent advancements in wireless wearable electronics, focusing on communication technologies and power solutions. It covers key design considerations, explores wireless protocols from short‐ to long‐range networks, and examines powering methods such as integrated sources and energy harvesting.
Choong Yeon Kim+8 more
wiley +1 more source
What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications [PDF]
Coverage-guided fuzz testing has received significant attention from the research community, with a strong focus on binary applications, greatly disregarding other targets, such as web applications. The importance of the World Wide Web in everyone's life cannot be overstated, and to this day, many web applications are developed in PHP. In this work, we
arxiv +1 more source
Encapsulated Organohydrogel Couplants for Wearable Ultrasounds
Hydrogels are ideal for wearable ultrasonic devices but suffer from water loss during long‐term monitoring. Adding excessive glycerol increases attenuation, while elastomer encapsulation causes uneven interfaces due to shrinkage and scattering acoustic waves.
Xiaoru Dong+7 more
wiley +1 more source
EmPoWeb: Empowering Web Applications with Browser Extensions [PDF]
Browser extensions are third party programs, tightly integrated to browsers, where they execute with elevated privileges in order to provide users with additional functionalities. Unlike web applications, extensions are not subject to the Same Origin Policy (SOP) and therefore can read and write user data on any web application.
arxiv
Photocatalytic and Electrochemical Synthesis of Biofuel via Efficient Valorization of Biomass
This review highlights biomass and biofuel traits, exploring photocatalysis and electrocatalysis mechanisms and their synergistic technologies in biofuel production. It analyzes environmental and economic impacts of green catalytic processes, assesses current challenges, and outlines future research directions, condensing complex topics into a focused ...
Dalin Sun+9 more
wiley +1 more source
A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version) [PDF]
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application.
arxiv
Model based Security Risk Analysis for Web Applications: The CORAS approach [PDF]
Theo Dimitrakos+3 more
openalex +1 more source