Results 141 to 150 of about 1,062,697 (366)

Using Model Driven Security Approaches in Web Application Development [PDF]

open access: bronze, 2014
Christoph Hochreiner   +4 more
openalex   +1 more source

Measuring specialty crop grower willingness to pay for genetic modification and genetic editing

open access: yesAgribusiness, EarlyView.
Abstract In contrast to the widespread adoption of agricultural commodities modified using biotechnology, the adoption rate of bioengineered specialty crops by growers remains low. The use of bioengineered crops has been controversial since their introduction in the 1990s due to concerns about their potentially harmful effects to human health, the ...
Marie Abbey   +5 more
wiley   +1 more source

Impacts of geopolitics and policy on Latin American biodiversity and water resources

open access: yesAgribusiness, EarlyView.
Abstract Latin America is a major agricultural producer with important natural resources. Efforts have been made to protect sensitive areas but are hindered by agricultural trade disruptions outside the control of individual countries due to globally integrated crop markets.
Jerome Dumortier   +2 more
wiley   +1 more source

A Framework for Evaluation of SQL Injection Detection and Prevention Tools

open access: yesInternational Journal of Information and Communication Technology Research, 2013
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj  

A Comparative Analysis and Scoping Review of Soft–Rigid and Industrial Parallel Rigid Grippers

open access: yesAdvanced Intelligent Systems, EarlyView.
In this article, the potential of soft–rigid grippers to meet industrial demands, focusing on their adaptability and efficiency in various applications, is investigated. It explores innovative solutions to overcome current challenges such as limited gripping strength, durability, and precise control, aiming to enhance the performance and versatility of
Lutong Li   +7 more
wiley   +1 more source

Security Testing Framework for Web Applications: Benchmarking ZAP V2.12.0 and V2.13.0 by OWASP as an example [PDF]

open access: yesarXiv
The Huge growth in the usage of web applications has raised concerns regarding their security vulnerabilities, which in turn pushes toward robust security testing tools. This study compares OWASP ZAP, the leading open-source web application vulnerability scanner, across its two most recent iterations.
arxiv  

Multi‐Distance Spatial‐Temporal Graph Neural Network for Anomaly Detection in Blockchain Transactions

open access: yesAdvanced Intelligent Systems, EarlyView.
This paper presents a novel Multi‐Distance Spatial‐Temporal Graph Neural Network for detecting anomalies in blockchain transactions. The model combines multi‐distance graph convolutions with adaptive temporal modeling to capture complex patterns in anonymized cryptocurrency networks.
Shiyang Chen   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy