Results 81 to 90 of about 1,346,069 (376)
Centralized Web Application Firewall Security System
In this paper we propose a centralized web firewall system for web application security which will provide a new type of synchronized system, which has the ability to detect and prevent a variety of web application attacks for a wide range of hosts at ...
S. Manaseer, A. K. Hwaitat
semanticscholar +1 more source
Enzyme‐Regulated Extended Swelling of Hydrogels for Dehiscence‐Less Tissue Expansions
An interpenetrating hydrogel network with swelling under regulation by enzymatic degradation (INSURED) is fabricated to avoid dehiscence. INSURED remains structurally intact post‐implantation, while HYAL injection enables control over the onset and rate of swelling.
Byung Ik Park +10 more
wiley +1 more source
Comparison of the effectiveness of tools for testing the security of web applications
This article presents a comparative analysis of the effectiveness of three web application security scanners: ZAP, Wapiti, and Skipfish. Automated scanning was conducted on deliberately unsecured applications, followed by an analysis of the detected ...
Izabela Kaźmierak
doaj +1 more source
The development of technologies leads to the expansion of the range of services provided on the Internet, the online business is actively developing. As a rule, when creating a new Web resource for business, the main emphasis is on the need to stand out ...
Артём Григорьевич Тецкий
doaj +1 more source
Protophilic TiOx/Ti3C2Tz Nanosheets for Hyper‐Efficient Closed‐Loop Pd Recycling
Protophilic TiOx/Ti3C2Tz NSs enable selective Pd(II) recovery through in situ adsorption‐reduction into Pd(0) NPs from spent catalyst leachates and industrial wastewaters. The resulting Pd/NS composites are directly upcycled as efficient HER electrocatalysts or regenerated for reuse through controlled surface regeneration.
Youngkyun Jung +8 more
wiley +1 more source
AProSec: an Aspect for Programming Secure Web Applications [PDF]
International audienceAdding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should take advantage of the modularity offered by new software
Duchien, Laurence +3 more
core +2 more sources
Application of Deep Learning Algorithm for Web Shell Detection in Web Application Security System
A web shell is a script executed on a web server, often used by hackers to gain control over an infected server. Detecting web shells is challenging due to their complex behavior patterns. This research focuses on using a deep learning approach to detect
Rezky Yuranda, Edi Surya Negara
doaj +1 more source
This review explores functional and responsive materials for triboelectric nanogenerators (TENGs) in sustainable smart agriculture. It examines how particulate contamination and dirt affect charge transfer and efficiency. Environmental challenges and strategies to enhance durability and responsiveness are outlined, including active functional layers ...
Rafael R. A. Silva +9 more
wiley +1 more source
Development of Security Identification and Monitoring System for Web Application [PDF]
Security is an essential entity to any software application. The most famous threat to any software application is unauthorized updating and deleting of the application and data.
Dani, Norizawati
core
An efficient deception architecture for cloud-based virtual networks
Emerging deceptive systems present a new promise for the uprising security problems in cloud-based virtual networks, especially those operated by small and medium enterprises. The main goal of deceptive systems is to form a layer of defensive nodes in an
Mohammad Qasem, Hussain M J Almohri
doaj

