Results 71 to 80 of about 1,157,333 (342)

Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]

open access: yes, 2012
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu   +2 more
core  

Epidermal Patch Technologies for Integrated Healthcare and Infection Management

open access: yesAdvanced Healthcare Materials, EarlyView.
Epidermal patches have evolved from simple wound coverings into multifunctional, skin‐conformable platforms integrating drug delivery, biosensing, and therapeutic functionalities. This review highlights their material innovations, fabrication strategies, and intelligent designs, including hydrogels, microneedles, and flexible electronics, while ...
Yuqi Wang   +7 more
wiley   +1 more source

Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application

open access: yesAdvanced Materials, EarlyView.
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong   +12 more
wiley   +1 more source

Tough, Ductile, and Strong Hard‐Soft Cementitious Composite Enabled by Multi‐Material Additive Manufacturing

open access: yesAdvanced Materials, EarlyView.
Drawing inspiration from the layered hard‐soft architecture found in sea sponges, this work establishes a new framework for architected cementitious composites (ACC) through multi‐material additive manufacturing (MMAM) process. The integration of mortar and elastomer phases into layered architectures enables synergistic toughening mechanisms, including
Aimane Najmeddine   +5 more
wiley   +1 more source

The Web SSO Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines

open access: yes, 2017
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal are based on the OpenID Connect protocol. This protocol enables so-called relying parties to delegate user authentication to so-called identity providers.
Fett, Daniel   +2 more
core   +1 more source

Positively Charged Polymer‐Brush MOFs for Large‐Area, Pressure‐Resistant Gas Separation Membranes

open access: yesAdvanced Materials, EarlyView.
A universal POPA strategy enables positively charged polymer‐brush MOFs with self‐adaptive interfacial interlocking to resist aggregation under fast processing. This design ensures seamless dispersion within large‐area selective layers, achieving 1 m‐wide roll‐to‐roll fabrication of pressure‐resistant MMCMs with tunable CO2 separation performance ...
Yi Yang   +11 more
wiley   +1 more source

A Web Second-Order Vulnerabilities Detection Method

open access: yesIEEE Access, 2018
Second-order vulnerabilities are more subtle and more destructive than the first-order vulnerabilities. After researching and analyzing the principles of web penetration testing and second-order attack principles, this paper proposes a method to detect ...
Miao Liu, Bin Wang
doaj   +1 more source

Neuromorphic Electronics for Intelligence Everywhere: Emerging Devices, Flexible Platforms, and Scalable System Architectures

open access: yesAdvanced Materials, EarlyView.
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj   +8 more
wiley   +1 more source

Enhancing Online Security: A Novel Machine Learning Framework for Robust Detection of Known and Unknown Malicious URLs

open access: yesJournal of Theoretical and Applied Electronic Commerce Research
The rapid expansion of the internet has led to a corresponding surge in malicious online activities, posing significant threats to users and organizations.
Shiyun Li, Omar Dib
doaj   +1 more source

Rancang Bangun Keamanan Web Service Dengan Metode Ws-Security

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2012
Abstrak Web service menggunakan teknologi XML dalam melakukan pertukaran data. Umumnya penggunaan web service terjadi pertukaran data ataupun informasi penting yang perlu dijaga keamanannya.
Ari Muzakir, Ahmad Ashari
doaj   +1 more source

Home - About - Disclaimer - Privacy