Results 81 to 90 of about 1,062,697 (366)

Materials Advances in Devices for Heart Disease Interventions

open access: yesAdvanced Materials, EarlyView.
This review examines the crucial role of materials in heart disease interventions, focusing on strategies for monitoring, managing, and repairing heart conditions. It discusses the material requirements for medical devices, highlighting recent innovations and their impact on cardiovascular health.
Gagan K. Jalandhra   +11 more
wiley   +1 more source

Application of Deep Learning Algorithm for Web Shell Detection in Web Application Security System

open access: yesJurnal Sisfokom
A web shell is a script executed on a web server, often used by hackers to gain control over an infected server. Detecting web shells is challenging due to their complex behavior patterns. This research focuses on using a deep learning approach to detect
Rezky Yuranda, Edi Surya Negara
doaj   +1 more source

SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall

open access: yesJOIV: International Journal on Informatics Visualization, 2018
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson   +2 more
doaj   +1 more source

Models and scenarios of implementation of threats for internet resources

open access: yesРоссийский технологический журнал, 2020
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj   +1 more source

Next‐Generation Image Sensors Based on Low‐Dimensional Semiconductor Materials

open access: yesAdvanced Materials, EarlyView.
Low‐dimensional semiconductor materials are promising candidates for photosensitive components in next‐generation image sensors. This review offers a thorough and timely examination of novel image sensors, covering their working principles, intriguing materials categorized into four main groups, and advanced imaging applications.
Yunxia Hu   +3 more
wiley   +1 more source

Implementasi JSON Web Token Berbasis Algoritma SHA-512 untuk Otentikasi Aplikasi BatikKita

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2020
Batikkita is an android based application and web framework laravel web service architecture that is used to bring together between craftsmen and consumers of batik Trusmi and batikkita application with the e-commerce model used is business to customer ...
Andi Setiawan, Ade Irma Purnamasari
doaj   +1 more source

Production of Parallel Aligned Nanofiber Rovings From Continuous Bundles

open access: yesAdvanced Materials Technologies, EarlyView.
Continuous nanofiber rovings are produced via electrospinning. The integration of false twisting and drawing improved fiber properties. Optimized twisting increases fiber alignment and tensile strength. The drawing process reduces the average nanofiber diameter from 297 to 200 nm and decreases the standard deviation of alignment angles from 14.2° to 8 ...
Behzat Yıldırım   +3 more
wiley   +1 more source

High‐Fidelity Information Transmission Through the Turbulent Atmosphere Utilizing Partially Coherent Cylindrical Vector Beams

open access: yesAdvanced Photonics Research, EarlyView.
A novel free‐space optical communication protocol that combines the benefits of partially coherent light sources with the decoding capabilities of convolutional neural networks is proposed. This approach establishes a robust communication link that can withstand atmospheric turbulence.
Linxuan Yao   +6 more
wiley   +1 more source

A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications [PDF]

open access: yesInformatică economică, 2011
This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database.
Silvia TRIF, Adrian VISOIU
doaj  

Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro

open access: yesJurnal Teknologi dan Sistem Komputer, 2016
The security aspect is often forgotten in the application of Information Technology. The attacks were caused by the negligence of the developer causes damage to the system used. SQL Injection attacks, Cross Site Scripting attacks, and no use of encrypted
Hilal Afrih Juhad   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy