Results 81 to 90 of about 1,281,108 (372)
Comparison of the effectiveness of tools for testing the security of web applications
This article presents a comparative analysis of the effectiveness of three web application security scanners: ZAP, Wapiti, and Skipfish. Automated scanning was conducted on deliberately unsecured applications, followed by an analysis of the detected ...
Izabela Kaźmierak
doaj +1 more source
The development of technologies leads to the expansion of the range of services provided on the Internet, the online business is actively developing. As a rule, when creating a new Web resource for business, the main emphasis is on the need to stand out ...
Артём Григорьевич Тецкий
doaj +1 more source
A Bio‐Inspired Perspective on Materials Sustainability
This perspective discusses natural materials as inspiration for sustainable engineering designs and the processing of materials. First, circularity, longevity, parsimony, and activity are presented as essential material paradigms. The perspective then uses many examples of natural and technical materials to introduce principles such as oligo ...
Wolfgang Wagermaier+2 more
wiley +1 more source
Redesigning More Resilent Sahana System For Disaster Information In Indonesia [PDF]
This application is a disaster information system in Indonesia using Sahana platform that has many unique features of the integration Sahana disaster with some applications that have been built independently in the previous year of mudflow in Sidoarjo ...
Arna, Fariza+4 more
core
Web Engineering Security (WES) Methodology [PDF]
The impact of the World Wide Web on basic operational economical components in global information-rich civilizations is significant. The repercussions force organizations to provide justification for security from a business-case perspective and to focus
Glisson, William Bradley, Welland, Ray
core +2 more sources
Continuous data breaches targeting the invaluable medical records have become a nemesis for the healthcare organizations. A secure and effective information security model in healthcare web applications can gain and enhance the respect as well as revenue
Alka Agrawal+6 more
doaj +1 more source
State‐of‐the‐Art, Insights, and Perspectives for MOFs‐Nanocomposites and MOF‐Derived (Nano)Materials
Different approaches to MOF‐NP composite formation, such as ship‐in‐a‐bottle, bottle‐around‐the‐ship and in situ one‐step synthesis, are used. Owing to synergistic effects, the advantageous features of the components of the composites are beneficially combined, and their individual drawbacks are mitigated.
Stefanos Mourdikoudis+6 more
wiley +1 more source
Van Der Waals Hybrid Integration of 2D Semimetals for Broadband Photodetection
Advanced broadband photodetector technologies are essential for military and civilian applications. 2D semimetals, with their gapless band structures, high mobility, and topological protection, offer great promise for broadband PDs. This study reviews the latest advancements in broadband PDs utilizing heterostructures that combine 2D semimetals with ...
Xue Li+9 more
wiley +1 more source
Internet security for mobile computing [PDF]
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core +1 more source
Application of Deep Learning Algorithm for Web Shell Detection in Web Application Security System
A web shell is a script executed on a web server, often used by hackers to gain control over an infected server. Detecting web shells is challenging due to their complex behavior patterns. This research focuses on using a deep learning approach to detect
Rezky Yuranda, Edi Surya Negara
doaj +1 more source