Results 61 to 70 of about 1,281,108 (372)

Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]

open access: yes, 2012
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu   +2 more
core  

09141 Abstracts Collection -- Web Application Security [PDF]

open access: yes, 2010
From 29th March to 3rd April 2009 the Dagstuhl Seminar 09141 Web Application Security was held in Schloss Dagstuhl -- Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Boneh, Dan   +3 more
core   +1 more source

Multi‐Scaled Cellulosic Nanonetworks from Tunicates

open access: yesAdvanced Functional Materials, EarlyView.
Microbial and plant nanonetworks of cellulose have enabled a wide range of high‐performance yet sustainable materials. Herein, a third class of cellulosic nanonetworks is showcased by exploiting the only animal tissue‐producing cellulose nanofibers, i.e., ascidians. An ultrastructure including spherical cells and a microvasculature with diameters of 50–
Mano Govindharaj   +10 more
wiley   +1 more source

Intraoral Drug Delivery: Bridging the Gap Between Academic Research and Industrial Innovations

open access: yesAdvanced Functional Materials, EarlyView.
Intraoral drug delivery offers a promising route for systemic and localized therapies, yet challenges such as enzymatic degradation, limited permeability, and microbial interactions hinder efficacy. This figure highlights innovative strategies—mucoadhesive materials, enzyme inhibitors, and permeation enhancers—to overcome these barriers.
Soheil Haddadzadegan   +4 more
wiley   +1 more source

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

A hybrid fuzzy rule-based multi-criteria framework for sustainable-security assessment of web application

open access: yesAin Shams Engineering Journal, 2021
The present day environment of cyber-attacks is a threat to even the most secure systems. With each passing day, the attackers are adapting new technologies to infiltrate systems and exploit even the minutest of the vulnerabilities.
Rajeev Kumar   +5 more
doaj  

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

Development of Security Identification and Monitoring System for Web Application [PDF]

open access: yes, 1999
Security is an essential entity to any software application. The most famous threat to any software application is unauthorized updating and deleting of the application and data.
Dani, Norizawati
core  

Web Vulnerability Study of Online Pharmacy Sites [PDF]

open access: yes
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core   +1 more source

Security For Three-Tiered Web Application

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing
Wisal H. Abdulsalam
doaj  

Home - About - Disclaimer - Privacy