Results 81 to 90 of about 1,346,069 (376)

Centralized Web Application Firewall Security System

open access: yesModern Applied Science, 2018
In this paper we propose a centralized web firewall system for web application security which will provide a new type of synchronized system, which has the ability to  detect  and prevent a variety of web application attacks for a wide range of hosts at ...
S. Manaseer, A. K. Hwaitat
semanticscholar   +1 more source

Enzyme‐Regulated Extended Swelling of Hydrogels for Dehiscence‐Less Tissue Expansions

open access: yesAdvanced Functional Materials, EarlyView.
An interpenetrating hydrogel network with swelling under regulation by enzymatic degradation (INSURED) is fabricated to avoid dehiscence. INSURED remains structurally intact post‐implantation, while HYAL injection enables control over the onset and rate of swelling.
Byung Ik Park   +10 more
wiley   +1 more source

Comparison of the effectiveness of tools for testing the security of web applications

open access: yesJournal of Computer Sciences Institute
This article presents a comparative analysis of the effectiveness of three web application security scanners: ZAP, Wapiti, and Skipfish. Automated scanning was conducted on deliberately unsecured applications, followed by an analysis of the detected ...
Izabela Kaźmierak
doaj   +1 more source

APPLYING OF ATTACK TREES FOR ESTIMATION THE PROBABILITY OF A SUCCESSFUL ATTACK OF THE WEB-APPLICATION

open access: yesРадіоелектронні і комп'ютерні системи, 2018
The development of technologies leads to the expansion of the range of services provided on the Internet, the online business is actively developing. As a rule, when creating a new Web resource for business, the main emphasis is on the need to stand out ...
Артём Григорьевич Тецкий
doaj   +1 more source

Protophilic TiOx/Ti3C2Tz Nanosheets for Hyper‐Efficient Closed‐Loop Pd Recycling

open access: yesAdvanced Functional Materials, EarlyView.
Protophilic TiOx/Ti3C2Tz NSs enable selective Pd(II) recovery through in situ adsorption‐reduction into Pd(0) NPs from spent catalyst leachates and industrial wastewaters. The resulting Pd/NS composites are directly upcycled as efficient HER electrocatalysts or regenerated for reuse through controlled surface regeneration.
Youngkyun Jung   +8 more
wiley   +1 more source

AProSec: an Aspect for Programming Secure Web Applications [PDF]

open access: yes, 2007
International audienceAdding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should take advantage of the modularity offered by new software
Duchien, Laurence   +3 more
core   +2 more sources

Application of Deep Learning Algorithm for Web Shell Detection in Web Application Security System

open access: yesJurnal Sisfokom
A web shell is a script executed on a web server, often used by hackers to gain control over an infected server. Detecting web shells is challenging due to their complex behavior patterns. This research focuses on using a deep learning approach to detect
Rezky Yuranda, Edi Surya Negara
doaj   +1 more source

Functional Materials for Environmental Energy Harvesting in Smart Agriculture via Triboelectric Nanogenerators

open access: yesAdvanced Functional Materials, EarlyView.
This review explores functional and responsive materials for triboelectric nanogenerators (TENGs) in sustainable smart agriculture. It examines how particulate contamination and dirt affect charge transfer and efficiency. Environmental challenges and strategies to enhance durability and responsiveness are outlined, including active functional layers ...
Rafael R. A. Silva   +9 more
wiley   +1 more source

Development of Security Identification and Monitoring System for Web Application [PDF]

open access: yes, 1999
Security is an essential entity to any software application. The most famous threat to any software application is unauthorized updating and deleting of the application and data.
Dani, Norizawati
core  

An efficient deception architecture for cloud-based virtual networks

open access: yesKuwait Journal of Science, 2019
Emerging deceptive systems present a new promise for the uprising security problems in cloud-based virtual networks, especially those operated by small and medium enterprises. The main goal of deceptive systems is to form a layer of defensive nodes in an
Mohammad Qasem, Hussain M J Almohri
doaj  

Home - About - Disclaimer - Privacy