Results 71 to 80 of about 781,799 (337)

Threat Modelling for Active Directory [PDF]

open access: yes, 2004
This paper analyses the security threats that can arise against an Active Directory server when it is included in a Web application. The approach is based on the STRIDE classification methodology.
Chadwick, David
core   +2 more sources

Durable Physically Mixed Microporous and Mesoporous MOFs/Nanofiber Aerogel 3D Composites for Effective Toxic Gas Capture and Organophosphonate Detoxification

open access: yesAdvanced Functional Materials, EarlyView.
Ultralight 3D nanofibrous aerogels embedded with metal‐organic frameworks effectively capture and neutralize toxic gases and organophosphonates. Incorporating mesoporous UiO‐66‐NH2 and HKUST‐1 into PAN/PVP fibers enables high MOF loading while maintaining mechanical strength and structural stability.
Mai O. Abdelmigeed   +6 more
wiley   +1 more source

AProSec: an Aspect for Programming Secure Web Applications [PDF]

open access: yes, 2007
International audienceAdding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should take advantage of the modularity offered by new software
Duchien, Laurence   +3 more
core   +2 more sources

Charge‐Induced Morphing Gels for Bioinspired Actuation

open access: yesAdvanced Functional Materials, EarlyView.
This study introduces a novel electroactive actuation mechanism that enables the gel material to generate substantial and reversible shape‐changing while preserving topological and isochoric (volumetric) equivalence. The resultant morphing behaviors can mimic the movements of muscle‐driven organelles in nature, including cilia‐like beating and ...
Ciqun Xu   +4 more
wiley   +1 more source

SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall

open access: yesJOIV: International Journal on Informatics Visualization, 2018
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson   +2 more
doaj   +1 more source

Solvent‐Free Bonding Mechanisms and Microstructure Engineering in Dry Electrode Technology for Lithium‐Ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
Dry electrode technology revolutionizes battery manufacturing by eliminating toxic solvents and energy‐intensive drying. This work details two promising techniques: dry spray deposition and polymer fibrillation. How their unique solvent‐free bonding mechanisms create uniform microstructures for thicker, denser electrodes, boosting energy density and ...
Yuhao Liang   +7 more
wiley   +1 more source

Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro

open access: yesJurnal Teknologi dan Sistem Komputer, 2016
The security aspect is often forgotten in the application of Information Technology. The attacks were caused by the negligence of the developer causes damage to the system used. SQL Injection attacks, Cross Site Scripting attacks, and no use of encrypted
Hilal Afrih Juhad   +2 more
doaj   +1 more source

Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis

open access: yesIEEE Access, 2020
Continuous data breaches targeting the invaluable medical records have become a nemesis for the healthcare organizations. A secure and effective information security model in healthcare web applications can gain and enhance the respect as well as revenue
Alka Agrawal   +6 more
doaj   +1 more source

Spectrally Tunable 2D Material‐Based Infrared Photodetectors for Intelligent Optoelectronics

open access: yesAdvanced Functional Materials, EarlyView.
Intelligent optoelectronics through spectral engineering of 2D material‐based infrared photodetectors. Abstract The evolution of intelligent optoelectronic systems is driven by artificial intelligence (AI). However, their practical realization hinges on the ability to dynamically capture and process optical signals across a broad infrared (IR) spectrum.
Junheon Ha   +18 more
wiley   +1 more source

Researching of Covert Timing Channels Based on HTTP Cache Headers in Web API

open access: yesБезопасность информационных технологий, 2015
In this paper, it is shown how covert timing channels based on HTTP cache headers can be implemented using different Web API of Google Drive, Dropbox and Facebook  Internet services.
Denis Nikolaevich Kolegov   +2 more
doaj  

Home - About - Disclaimer - Privacy