Results 111 to 120 of about 1,062,697 (366)

Web Applications Security and Vulnerability Analysis Financial Web Applications Security Audit – A Case Study

open access: yesInternational Journal of Innovative Business Strategies, 2016
Information security can no longer be neglected in any area. It is a concern to everyone and every organization. This is particularly important in the finance sector, not only because the financial amounts involved but also clients and organization’s private and sensitive information. As a way to test security in infrastructures, networks, deployed web
Vieira, T., Serrão, C.
openaire   +3 more sources

PROP - Patronage of PHP Web Applications [PDF]

open access: yesarXiv, 2015
PHP is one of the most commonly used languages to develop web sites because of its simplicity, easy to learn and it can be easily embedded with any of the databases. A web developer with his basic knowledge developing an application without practising secure guidelines, improper validation of user inputs leads to various source code vulnerabilities ...
arxiv  

Wireless Technologies for Wearable Electronics: A Review

open access: yesAdvanced Electronic Materials, EarlyView.
This review discusses recent advancements in wireless wearable electronics, focusing on communication technologies and power solutions. It covers key design considerations, explores wireless protocols from short‐ to long‐range networks, and examines powering methods such as integrated sources and energy harvesting.
Choong Yeon Kim   +8 more
wiley   +1 more source

What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications [PDF]

open access: yesProceedings of the 19th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2024, pages 1523 to 1538
Coverage-guided fuzz testing has received significant attention from the research community, with a strong focus on binary applications, greatly disregarding other targets, such as web applications. The importance of the World Wide Web in everyone's life cannot be overstated, and to this day, many web applications are developed in PHP. In this work, we
arxiv   +1 more source

Encapsulated Organohydrogel Couplants for Wearable Ultrasounds

open access: yesAdvanced Electronic Materials, EarlyView.
Hydrogels are ideal for wearable ultrasonic devices but suffer from water loss during long‐term monitoring. Adding excessive glycerol increases attenuation, while elastomer encapsulation causes uneven interfaces due to shrinkage and scattering acoustic waves.
Xiaoru Dong   +7 more
wiley   +1 more source

EmPoWeb: Empowering Web Applications with Browser Extensions [PDF]

open access: yesarXiv, 2019
Browser extensions are third party programs, tightly integrated to browsers, where they execute with elevated privileges in order to provide users with additional functionalities. Unlike web applications, extensions are not subject to the Same Origin Policy (SOP) and therefore can read and write user data on any web application.
arxiv  

Security models for web-based applications [PDF]

open access: bronze, 2001
James Joshi   +3 more
openalex   +1 more source

Photocatalytic and Electrochemical Synthesis of Biofuel via Efficient Valorization of Biomass

open access: yesAdvanced Energy Materials, EarlyView.
This review highlights biomass and biofuel traits, exploring photocatalysis and electrocatalysis mechanisms and their synergistic technologies in biofuel production. It analyzes environmental and economic impacts of green catalytic processes, assesses current challenges, and outlines future research directions, condensing complex topics into a focused ...
Dalin Sun   +9 more
wiley   +1 more source

A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version) [PDF]

open access: yesarXiv, 2017
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application.
arxiv  

Model based Security Risk Analysis for Web Applications: The CORAS approach [PDF]

open access: hybrid, 2002
Theo Dimitrakos   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy