Results 41 to 50 of about 4,673,218 (333)

Enhancing Web Application Security with Open-AppSec WAF on CDN Infrastructure

open access: yesJournal of Information Systems and Informatics
The increasing number of cyberattacks targeting web applications has made security a critical concern, with vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Broken Authentication, and Cross-Site Request Forgery (CSRF) remaining ...
Andi Yusdar Al Imran   +2 more
doaj   +1 more source

Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache

open access: yesIEEE Access, 2019
Security analysis of a web system is complicated, and thus analysis using formal methods to describe system specification mathematically has attracted attention.
Hayato Shimamoto   +5 more
doaj   +1 more source

How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples

open access: yesIEEE Symposium on Security and Privacy, 2019
Security and privacy researchers often rely on data collected from Amazon Mechanical Turk (MTurk) to evaluate security tools, to understand users' privacy preferences and to measure online behavior.
Elissa M. Redmiles   +2 more
semanticscholar   +1 more source

Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein   +13 more
wiley   +1 more source

Machine Learning-Driven Detection of Cross-Site Scripting Attacks

open access: yesInformation
The ever-growing web application landscape, fueled by technological advancements, introduces new vulnerabilities to cyberattacks. Cross-site scripting (XSS) attacks pose a significant threat, exploiting the difficulty of distinguishing between benign and
Rahmah Alhamyani, Majid Alshammari
doaj   +1 more source

Evaluating Performance of Web Application Security Through a Fuzzy Based Hybrid Multi-Criteria Decision-Making Approach: Design Tactics Perspective

open access: yesIEEE Access, 2020
Design of software can have a major impact on the overall security of the software. Developing a secure website design is a challenge for architectures. It depends on different and tough decisions which determine the security of website.
Mamdouh Alenezi   +3 more
semanticscholar   +1 more source

Economic Burden of Rheumatoid Arthritis in Low‐ and Middle‐Income Countries: Systematic Review and Meta‐Analysis

open access: yesArthritis Care &Research, EarlyView.
Objective The aim of this systematic review was to synthesize the economic impact of rheumatoid arthritis (RA) on households, health systems, and society in low‐ and middle‐income countries (LMICs). Methods Electronic databases such as PubMed, Web of Science, and CINAHL were searched using keywords related to RA and cost of illness.
Tadesse Gebrye   +6 more
wiley   +1 more source

ATBShellFinder: A Bytecode-Level Webshell Detector Based on Adversarial Training

open access: yesIEEE Access
Webshell is a malicious server-side script that attackers can upload to a server to execute commands, steal sensitive data, and maintain persistent access.
Yuqin Xie   +3 more
doaj   +1 more source

Preferences for post‐traumatic osteoarthritis prevention strategies in individuals with anterior cruciate ligament injury

open access: yesArthritis Care &Research, Accepted Article.
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy   +9 more
wiley   +1 more source

I Know What You Did Last Summer: New Persistent Tracking Mechanisms in the Wild

open access: yesIEEE Access, 2018
As the usage of the Web increases, so do the threats an everyday user faces. One of the most pervasive threats a Web user faces is tracking, which enables an entity to gain unauthorized access to the user's personal data.
Stefano Belloro, Alexios Mylonas
doaj   +1 more source

Home - About - Disclaimer - Privacy