Using Model Driven Security Approaches in Web Application Development [PDF]
Christoph Hochreiner+4 more
openalex +1 more source
Measuring specialty crop grower willingness to pay for genetic modification and genetic editing
Abstract In contrast to the widespread adoption of agricultural commodities modified using biotechnology, the adoption rate of bioengineered specialty crops by growers remains low. The use of bioengineered crops has been controversial since their introduction in the 1990s due to concerns about their potentially harmful effects to human health, the ...
Marie Abbey+5 more
wiley +1 more source
Fuzzy Based Decision-Making Approach for Estimating Usable-Security of Healthcare Web Applications [PDF]
Fahad Alzahrani
openalex +1 more source
Impacts of geopolitics and policy on Latin American biodiversity and water resources
Abstract Latin America is a major agricultural producer with important natural resources. Efforts have been made to protect sensitive areas but are hindered by agricultural trade disruptions outside the control of individual countries due to globally integrated crop markets.
Jerome Dumortier+2 more
wiley +1 more source
A Framework for Evaluation of SQL Injection Detection and Prevention Tools
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj
A Comparative Analysis and Scoping Review of Soft–Rigid and Industrial Parallel Rigid Grippers
In this article, the potential of soft–rigid grippers to meet industrial demands, focusing on their adaptability and efficiency in various applications, is investigated. It explores innovative solutions to overcome current challenges such as limited gripping strength, durability, and precise control, aiming to enhance the performance and versatility of
Lutong Li+7 more
wiley +1 more source
Security Testing Framework for Web Applications: Benchmarking ZAP V2.12.0 and V2.13.0 by OWASP as an example [PDF]
The Huge growth in the usage of web applications has raised concerns regarding their security vulnerabilities, which in turn pushes toward robust security testing tools. This study compares OWASP ZAP, the leading open-source web application vulnerability scanner, across its two most recent iterations.
arxiv
Dynamic Analysis for Security Testing of WEB Based Applications Using Agent Technology [PDF]
Jyoti Kamal, Fathy Eassa, Muhammad Imran
openalex +1 more source
This paper presents a novel Multi‐Distance Spatial‐Temporal Graph Neural Network for detecting anomalies in blockchain transactions. The model combines multi‐distance graph convolutions with adaptive temporal modeling to capture complex patterns in anonymized cryptocurrency networks.
Shiyang Chen+4 more
wiley +1 more source
Malware Analysis in Web Application Security: An Investigation and Suggestion [PDF]
Abhishek Pandey, Fawaz Alsolami
openalex +1 more source