Results 71 to 80 of about 781,799 (337)
Threat Modelling for Active Directory [PDF]
This paper analyses the security threats that can arise against an Active Directory server when it is included in a Web application. The approach is based on the STRIDE classification methodology.
Chadwick, David
core +2 more sources
Ultralight 3D nanofibrous aerogels embedded with metal‐organic frameworks effectively capture and neutralize toxic gases and organophosphonates. Incorporating mesoporous UiO‐66‐NH2 and HKUST‐1 into PAN/PVP fibers enables high MOF loading while maintaining mechanical strength and structural stability.
Mai O. Abdelmigeed +6 more
wiley +1 more source
AProSec: an Aspect for Programming Secure Web Applications [PDF]
International audienceAdding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should take advantage of the modularity offered by new software
Duchien, Laurence +3 more
core +2 more sources
Charge‐Induced Morphing Gels for Bioinspired Actuation
This study introduces a novel electroactive actuation mechanism that enables the gel material to generate substantial and reversible shape‐changing while preserving topological and isochoric (volumetric) equivalence. The resultant morphing behaviors can mimic the movements of muscle‐driven organelles in nature, including cilia‐like beating and ...
Ciqun Xu +4 more
wiley +1 more source
SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson +2 more
doaj +1 more source
Dry electrode technology revolutionizes battery manufacturing by eliminating toxic solvents and energy‐intensive drying. This work details two promising techniques: dry spray deposition and polymer fibrillation. How their unique solvent‐free bonding mechanisms create uniform microstructures for thicker, denser electrodes, boosting energy density and ...
Yuhao Liang +7 more
wiley +1 more source
Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro
The security aspect is often forgotten in the application of Information Technology. The attacks were caused by the negligence of the developer causes damage to the system used. SQL Injection attacks, Cross Site Scripting attacks, and no use of encrypted
Hilal Afrih Juhad +2 more
doaj +1 more source
Continuous data breaches targeting the invaluable medical records have become a nemesis for the healthcare organizations. A secure and effective information security model in healthcare web applications can gain and enhance the respect as well as revenue
Alka Agrawal +6 more
doaj +1 more source
Spectrally Tunable 2D Material‐Based Infrared Photodetectors for Intelligent Optoelectronics
Intelligent optoelectronics through spectral engineering of 2D material‐based infrared photodetectors. Abstract The evolution of intelligent optoelectronic systems is driven by artificial intelligence (AI). However, their practical realization hinges on the ability to dynamically capture and process optical signals across a broad infrared (IR) spectrum.
Junheon Ha +18 more
wiley +1 more source
Researching of Covert Timing Channels Based on HTTP Cache Headers in Web API
In this paper, it is shown how covert timing channels based on HTTP cache headers can be implemented using different Web API of Google Drive, Dropbox and Facebook Internet services.
Denis Nikolaevich Kolegov +2 more
doaj

