Results 61 to 70 of about 155,949 (336)

BlackWatch: Increasing Attack Awareness Within Web Applications [PDF]

open access: yes, 2019
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of security.
arxiv   +1 more source

Ultrasoft Iontronics: Stretchable Diodes Enabled by Ionically Conductive Bottlebrush Elastomers

open access: yesAdvanced Functional Materials, EarlyView.
This work introduces a solvent‐free, ultrasoft, and stretchable ionic diode based on oppositely charged bottlebrush elastomers (BBEs). The BBE diode exhibits an ultralow Young's modulus (<23 kPa), a high rectification ratio of 46, and stretchability over 400%.
Xia Wu   +6 more
wiley   +1 more source

Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS

open access: yesIEEE Access, 2019
Ensuring sustainable-security of web applications for minimizing security breaches and enhancing users' trust and satisfaction is the foremost priority of all security experts and web developers.
Alka Agrawal   +3 more
doaj   +1 more source

QoS Web Service Security Dynamic Intruder Detection System for HTTP SSL services [PDF]

open access: yesarXiv, 2016
Web services are expected to play significant role for message communications over internet applications. Most of the future work is web security. Online shopping and web services are increasing at rapid rate. In this paper we presented the fundamental concepts related to Network security, web security threats.
arxiv  

Transforming Cellulose Into Functional Three‐Dimensional Structures

open access: yesAdvanced Functional Materials, EarlyView.
Cellulose is promising for replacing synthetic polymers due to its excellent mechanical properties and low cost. This review highlights the recent advancements in transforming cellulose into functional 3D structures, including liquid gels and porous materials.
Xia Sun   +5 more
wiley   +1 more source

Real-Time Threat Detection with JavaScript: Monitoring and Response Mechanisms

open access: yesТехнічна інженерія
Web apps are essential to contemporary life but are also vulnerable to many security concerns. This article examines real-time threat detection, monitoring, and response techniques at the confluence of JavaScript and security.
A.I. Orynchak   +2 more
doaj   +1 more source

Probing Early Particle‐Cell Membrane Interactions via Single‐Cell and Single‐Particle Interaction Analysis

open access: yesAdvanced Functional Materials, EarlyView.
The pre‐internalization phase of endocytosis remains poorly characterized at single‐cell levels. Single‐cell pre‐internalization mechanics are investigated using advanced robotic techniques. Cancer cells exhibit biphasic adhesion – rapid initial binding followed by reinforcement – while fibroblasts show gradual engagement.
Houari Bettahar   +6 more
wiley   +1 more source

A Review of Gaps between Web 4.0 and Web 3.0 Intelligent Network Infrastructure [PDF]

open access: yesarXiv, 2023
World Wide Web is speeding up its pace into an intelligent and decentralized ecosystem, as seen in the campaign of Web 3.0 and forthcoming Web 4.0. Marked by the Europe Commission's latest mention of Web 4.0, a race towards strategic Web 4.0 success has started.
arxiv  

A Bio‐Inspired Perspective on Materials Sustainability

open access: yesAdvanced Materials, EarlyView.
This perspective discusses natural materials as inspiration for sustainable engineering designs and the processing of materials. First, circularity, longevity, parsimony, and activity are presented as essential material paradigms. The perspective then uses many examples of natural and technical materials to introduce principles such as oligo ...
Wolfgang Wagermaier   +2 more
wiley   +1 more source

A Web Second-Order Vulnerabilities Detection Method

open access: yesIEEE Access, 2018
Second-order vulnerabilities are more subtle and more destructive than the first-order vulnerabilities. After researching and analyzing the principles of web penetration testing and second-order attack principles, this paper proposes a method to detect ...
Miao Liu, Bin Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy