Results 41 to 50 of about 1,062,697 (366)

CorbFuzz: Checking Browser Security Policies with Fuzzing [PDF]

open access: yesarXiv, 2021
Browsers use security policies to block malicious behaviors. Cross-Origin Read Blocking (CORB) is a browser security policy for preventing side-channel attacks such as Spectre. We propose a web browser security policy fuzzer called CorbFuzz for checking CORB and similar policies.
arxiv  

Maize–soybean intercropping: A bibliometric analysis of 30 years of research publications

open access: yesAgronomy Journal, Volume 114, Issue 6, Page 3377-3388, November/December 2022., 2022
Abstract Maize (Zea may L.)–soybean [Glycine max (L.) Merr.] intercropping is popular in many countries because of its high productivity. However, no studies have explored maize–soybean intercropping via bibliometric methods. Taking the Web of Science database, the visualization applications of CiteSpace and VOSviewer were used to visually analyze the ...
Liang Feng   +6 more
wiley   +1 more source

Toward discovering and exploiting private server-side Web API

open access: yes网络与信息安全学报, 2016
Most of the interfaces for mobile application and server interaction use the Web API for communication,but the Web API introduced by these mobile applications may introduce new security issues.To facilitate the study of the security of Web API,a system ...
Jia CHEN, Shan-qing GUO
doaj   +3 more sources

A Frictionless and Secure User Authentication in Web-Based Premium Applications

open access: yesIEEE Access, 2021
By and large, authentication systems employed for web-based applications primarily utilize conventional username and password-based schemes, which can be compromised easily.
Rashidah F. Olanrewaju   +4 more
doaj   +1 more source

Secure Development - Web Application Security. [PDF]

open access: yesIOSR Journal of Computer Engineering, 2013
In Current scenario, many Web applications go through rapid development phases like adopting agile methodology of development with very short turnaround time, making it difficult to identify and eliminate vulnerabilities. This paper provides analysis of requirement of Secure Development and Web application security assessment mechanisms in order to ...
openaire   +1 more source

A Secure Framework for Communication and Data Processing in Web Applications

open access: yesEngineering Proceedings, 2023
Web applications are widely used, and the applications deployed on the web do not always satisfy all the security policies. This may arise due to less secure configurations, less knowledge in security configurations, or due to insecure coding practices ...
Suprakash Sudarsanan Nair   +1 more
doaj   +1 more source

Vulnerability of injection attacks against the application security of framework based websites open web access security project (OWASP)

open access: yesJurnal Informatika, 2018
The development of website applications is currently growing rapidly, but it is not followed by a good security system that can cause the number of security holes that can be entered by the attacker. The number of website applications that are vulnerable
I. Riadi, R. Umar, W. Sukarno
semanticscholar   +1 more source

Music Interventions in Hyperacute and Acute Stroke Patients: A Randomized Controlled Pilot Feasibility Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Music interventions have been shown to have beneficial effects on hemodynamic parameters, pain, and anxiety in various medical settings. However, music interventions in the setting of acute stroke have not been studied. The objective of this trial was to perform a pilot feasibility study of music interventions in the setting of acute
Jeffrey J. Fletcher   +7 more
wiley   +1 more source

Web Application Security Tools Analysis

open access: yes2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), 2017
Strong security in web applications is critical to the success of your online presence. Security importance has grown massively, especially among web applications. Dealing with web application or website security issues requires deep insight and planning,
Abdulrahman Alzahrani   +4 more
semanticscholar   +1 more source

Scalable Manufacturing of Radiation‐Tolerant Potentiometric Electrodes: A Systematic Transition from Laboratory to Semiautomated Fabrication

open access: yesAdvanced Engineering Materials, EarlyView.
Laboratory protocols for producing thin‐film pH electrodes for sterilized single‐use technologies have been successfully developed into a semiautomated workflow, with higher throughput and precision of membrane thickness. Accuracies are within 0.05 pH units versus ground truth, and uncertainty analysis reveals the largest sources of error to be derived
Bingyuan Zhao   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy