Results 51 to 60 of about 4,673,218 (333)

Association Between Symptomatic Knee Osteoarthritis and Target Glycemic Control in Individuals with Type 2 Diabetes

open access: yesArthritis Care &Research, Accepted Article.
Objective Knee osteoarthritis (OA) commonly affects individuals with Type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King   +10 more
wiley   +1 more source

3PAC: Enforcing Access Policies for Web Services [PDF]

open access: yes, 2005
Web services fail to deliver on the promise of ubiquitous deployment and seamless interoperability due to the lack of a uniform, standards-based approach to all aspects of security.
Bemmel, J. van   +2 more
core   +2 more sources

Detecting Unintended Redirects to Malicious Websites on Android Devices Based on URL-Switching Interval

open access: yesIEEE Access
Website clicks that redirect Android-phone users to malicious websites with fake virus alerts or phishing attacks are increasing exponentially. Although a uniform resource locator (URL) blocklist is considered a suitable countermeasure to such attacks ...
Toshihiro Yamauchi   +3 more
doaj   +1 more source

Quantum Emitters in Hexagonal Boron Nitride: Principles, Engineering and Applications

open access: yesAdvanced Functional Materials, EarlyView.
Quantum emitters in hexagonal boron nitride have emerged as a promising candidate for quantum information science. This review examines the fundamentals of these quantum emitters, including their level structures, defect engineering, and their possible chemical structures.
Thi Ngoc Anh Mai   +8 more
wiley   +1 more source

Security and computer forensics in web engineering education [PDF]

open access: yes, 2010
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually.
Glisson, L.M., Glisson, W., Welland, R.
core  

Synchrotron Radiation for Quantum Technology

open access: yesAdvanced Functional Materials, EarlyView.
Materials and interfaces underpin quantum technologies, with synchrotron and FEL methods key to understanding and optimizing them. Advances span superconducting and semiconducting qubits, 2D materials, and topological systems, where strain, defects, and interfaces govern performance.
Oliver Rader   +10 more
wiley   +1 more source

Penerapan Laravel untuk Mengatasi Kelemahan Keamanan WordPress pada Website Badan Layanan Umum Daerah

open access: yesJurnal Saintekom
The BLUD.co.id website was previously developed using the Content Management System (CMS) WordPress, but it encountered security issues in the form of URL redirect attacks that directed users to untrusted sites.
Muhammad Sholeh   +2 more
doaj   +1 more source

Malicious URLs Detection Using Decision Tree Classifiers and Majority Voting Technique

open access: yesCybernetics and Information Technologies, 2018
Researchers all over the world have provided significant and effective solutions to detect malicious URLs. Still due to the ever changing nature of cyberattacks, there are many open issues.
Patil Dharmaraj R., Patil J. B.
doaj   +1 more source

Classification of Hospital Web Security Efficiency Using Data Envelopment Analysis and Support Vector Machine

open access: yes, 2013
This study proposes the hybrid data envelopment analysis (DEA) and support vector machine (SVM) approaches for efficiency estimation and classification in web security.
Han-Ying Kao   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy