Results 71 to 80 of about 1,281,108 (372)

Assessment of the web application security effectiveness against various methods of network attacks

open access: yesJournal of Computer Sciences Institute, 2018
The article discusses the issue of the security of Internet applications. The most popular types of attacks and methods of securing web applications against them are discussed. The study conducted the effectiveness of security of web applications.
Mateusz Erbel, Piotr Kopniak
doaj   +1 more source

Integration of Perovskite/Low‐Dimensional Material Heterostructures for Optoelectronics and Artificial Visual Systems

open access: yesAdvanced Functional Materials, EarlyView.
Heterojunctions combining halide perovskites with low‐dimensional materials enhance optoelectronic devices by enabling precise charge control and improving efficiency, stability, and speed. These synergies advance flexible electronics, wearable sensors, and neuromorphic computing, mimicking biological vision for real‐time image analysis and intelligent
Yu‐Jin Du   +11 more
wiley   +1 more source

Copper‐based Materials for Photo and Electrocatalytic Process: Advancing Renewable Energy and Environmental Applications

open access: yesAdvanced Functional Materials, EarlyView.
Cu‐based catalysts as a cornerstone in advancing sustainable energy technologies are fully reviewed in this manuscript, highlighting their potential in photo‐ and electrocatalysis. It includes metallic copper, copper oxides, copper sulfides, copper halide perovskites, copper‐based metal–organic frameworks (MOFs), and covalent organic frameworks (COFs),
Jéssica C. de Almeida   +16 more
wiley   +1 more source

Web Application Security

open access: yes, 2005
As more and more sensitive information is entering web based applications, and thus are available through a web browser, securing these systems is of increasing importance. A software system accessible through the web is continuously exposed to threats, and is accessible to anyone who would like to attempt a break-in. These systems can not rely on only
Abhishek Kumar   +2 more
openaire   +3 more sources

Web Server Security and Survey on Web Application Security [PDF]

open access: yes, 2014
A web server is a computer host configured and connected to Internet, for serving the web pages on request. Information on the public web server is accessed by anyone and anywhere on the Internet.
, Shaikh Bushra Almin
core   +2 more sources

Ultrasoft Iontronics: Stretchable Diodes Enabled by Ionically Conductive Bottlebrush Elastomers

open access: yesAdvanced Functional Materials, EarlyView.
This work introduces a solvent‐free, ultrasoft, and stretchable ionic diode based on oppositely charged bottlebrush elastomers (BBEs). The BBE diode exhibits an ultralow Young's modulus (<23 kPa), a high rectification ratio of 46, and stretchability over 400%.
Xia Wu   +6 more
wiley   +1 more source

Transforming Cellulose Into Functional Three‐Dimensional Structures

open access: yesAdvanced Functional Materials, EarlyView.
Cellulose is promising for replacing synthetic polymers due to its excellent mechanical properties and low cost. This review highlights the recent advancements in transforming cellulose into functional 3D structures, including liquid gels and porous materials.
Xia Sun   +5 more
wiley   +1 more source

Centralized Web Application Firewall Security System

open access: yesModern Applied Science, 2018
In this paper we propose a centralized web firewall system for web application security which will provide a new type of synchronized system, which has the ability to  detect  and prevent a variety of web application attacks for a wide range of hosts at ...
S. Manaseer, A. K. Hwaitat
semanticscholar   +1 more source

Probing Early Particle‐Cell Membrane Interactions via Single‐Cell and Single‐Particle Interaction Analysis

open access: yesAdvanced Functional Materials, EarlyView.
The pre‐internalization phase of endocytosis remains poorly characterized at single‐cell levels. Single‐cell pre‐internalization mechanics are investigated using advanced robotic techniques. Cancer cells exhibit biphasic adhesion – rapid initial binding followed by reinforcement – while fibroblasts show gradual engagement.
Houari Bettahar   +6 more
wiley   +1 more source

Detection of the Security Vulnerabilities in Web Applications [PDF]

open access: yesInformatică economică, 2009
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect. They are developed in an
doaj  

Home - About - Disclaimer - Privacy