Results 61 to 70 of about 1,281,108 (372)
Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu+2 more
core
09141 Abstracts Collection -- Web Application Security [PDF]
From 29th March to 3rd April 2009 the Dagstuhl Seminar 09141 Web Application Security was held in Schloss Dagstuhl -- Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Boneh, Dan+3 more
core +1 more source
Multi‐Scaled Cellulosic Nanonetworks from Tunicates
Microbial and plant nanonetworks of cellulose have enabled a wide range of high‐performance yet sustainable materials. Herein, a third class of cellulosic nanonetworks is showcased by exploiting the only animal tissue‐producing cellulose nanofibers, i.e., ascidians. An ultrastructure including spherical cells and a microvasculature with diameters of 50–
Mano Govindharaj+10 more
wiley +1 more source
Intraoral Drug Delivery: Bridging the Gap Between Academic Research and Industrial Innovations
Intraoral drug delivery offers a promising route for systemic and localized therapies, yet challenges such as enzymatic degradation, limited permeability, and microbial interactions hinder efficacy. This figure highlights innovative strategies—mucoadhesive materials, enzyme inhibitors, and permeation enhancers—to overcome these barriers.
Soheil Haddadzadegan+4 more
wiley +1 more source
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana+2 more
core +1 more source
The present day environment of cyber-attacks is a threat to even the most secure systems. With each passing day, the attackers are adapting new technologies to infiltrate systems and exploit even the minutest of the vulnerabilities.
Rajeev Kumar+5 more
doaj
Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai+8 more
wiley +1 more source
Development of Security Identification and Monitoring System for Web Application [PDF]
Security is an essential entity to any software application. The most famous threat to any software application is unauthorized updating and deleting of the application and data.
Dani, Norizawati
core
Web Vulnerability Study of Online Pharmacy Sites [PDF]
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core +1 more source
Security For Three-Tiered Web Application
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing
Wisal H. Abdulsalam
doaj