Results 71 to 80 of about 787,843 (284)

Researching of Covert Timing Channels Based on HTTP Cache Headers in Web API

open access: yesБезопасность информационных технологий, 2015
In this paper, it is shown how covert timing channels based on HTTP cache headers can be implemented using different Web API of Google Drive, Dropbox and Facebook  Internet services.
Denis Nikolaevich Kolegov   +2 more
doaj  

EmintWeb: Creation of embedded web applications in C++ for specific systems

open access: yesSoftwareX
Most contemporary web applications are primarily coded in interpreted languages (JavaScript, PHP, Python...) and are initiated by the web server. This requires solving the persistence issue: HTTP/HTTPS is a stateless protocol but user identity and ...
Juan Domingo   +2 more
doaj   +1 more source

Web Vulnerability Study of Online Pharmacy Sites [PDF]

open access: yes
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core   +1 more source

Neuromorphic Electronics for Intelligence Everywhere: Emerging Devices, Flexible Platforms, and Scalable System Architectures

open access: yesAdvanced Materials, EarlyView.
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj   +8 more
wiley   +1 more source

AI–Guided 4D Printing of Carnivorous Plants–Inspired Microneedles for Accelerated Wound Healing

open access: yesAdvanced Materials, EarlyView.
This work presents an artificial intelligence (AI)‐guided 4D‐printed microneedle platform inspired by carnivorous plants for wound healing. A thermo‐responsive shape memory polymer enables body temperature–triggered self‐coiling for autonomous wound closure.
Hyun Lee   +21 more
wiley   +1 more source

Secure Web Applications?

open access: yes, 2007
Today we live in a society that we call the information society where information has become a resource of great value. Along with this kind of society web applications that provide information through various services have appeared. Web applications have been driven to the point of very high visual appearance and services quality level but the part ...
Konecki, Mario   +2 more
openaire   +1 more source

Chemically Doped Conductive Polymers for Wearable Health Monitoring

open access: yesAdvanced Materials Technologies, EarlyView.
Among conductive polymers, poly(3,4‐ethylenedioxythiophene):poly(styrenesulfonate) (PEDOT:PSS), polyaniline (PANI), and polypyrrole (PPy) are the most studied and applied. Chemical doping significantly boosts intrinsic conductivity and mechanical robustness.
Mengdi Zuo   +5 more
wiley   +1 more source

Website Security Analysis Using Vulnerability Assessment Method

open access: yesJournal of Innovation Information Technology and Application
In today’s digital era, ensuring website security is crucial, especially in the education sector which is frequently targeted by cyber attacks. This  research aims to test security of the Universitas Internasional Batam (UIB) website using OWASP ZAP and ...
Haeruddin   +4 more
doaj   +1 more source

Techniques for Attacking Web Application Security

open access: yesInternational Journal of Information Sciences and Techniques, 2016
The web is absolutely necessary part of our lives. It is wide platform which is used for information sharing and service over internet. They are used for the financial, government, healthcare, education and many critical services. Everyday billions of user purchase items, transfer money, retrieve information and communicate over web with each other ...
openaire   +1 more source

Development of Security Identification and Monitoring System for Web Application [PDF]

open access: yes, 1999
Security is an essential entity to any software application. The most famous threat to any software application is unauthorized updating and deleting of the application and data.
Dani, Norizawati
core  

Home - About - Disclaimer - Privacy