Results 71 to 80 of about 1,157,333 (342)
Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu +2 more
core
Epidermal Patch Technologies for Integrated Healthcare and Infection Management
Epidermal patches have evolved from simple wound coverings into multifunctional, skin‐conformable platforms integrating drug delivery, biosensing, and therapeutic functionalities. This review highlights their material innovations, fabrication strategies, and intelligent designs, including hydrogels, microneedles, and flexible electronics, while ...
Yuqi Wang +7 more
wiley +1 more source
Bioinspired Adaptive Sensors: A Review on Current Developments in Theory and Application
This review comprehensively summarizes the recent progress in the design and fabrication of sensory‐adaptation‐inspired devices and highlights their valuable applications in electronic skin, wearable electronics, and machine vision. The existing challenges and future directions are addressed in aspects such as device performance optimization ...
Guodong Gong +12 more
wiley +1 more source
Drawing inspiration from the layered hard‐soft architecture found in sea sponges, this work establishes a new framework for architected cementitious composites (ACC) through multi‐material additive manufacturing (MMAM) process. The integration of mortar and elastomer phases into layered architectures enables synergistic toughening mechanisms, including
Aimane Najmeddine +5 more
wiley +1 more source
The Web SSO Standard OpenID Connect: In-Depth Formal Security Analysis and Security Guidelines
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal are based on the OpenID Connect protocol. This protocol enables so-called relying parties to delegate user authentication to so-called identity providers.
Fett, Daniel +2 more
core +1 more source
Positively Charged Polymer‐Brush MOFs for Large‐Area, Pressure‐Resistant Gas Separation Membranes
A universal POPA strategy enables positively charged polymer‐brush MOFs with self‐adaptive interfacial interlocking to resist aggregation under fast processing. This design ensures seamless dispersion within large‐area selective layers, achieving 1 m‐wide roll‐to‐roll fabrication of pressure‐resistant MMCMs with tunable CO2 separation performance ...
Yi Yang +11 more
wiley +1 more source
A Web Second-Order Vulnerabilities Detection Method
Second-order vulnerabilities are more subtle and more destructive than the first-order vulnerabilities. After researching and analyzing the principles of web penetration testing and second-order attack principles, this paper proposes a method to detect ...
Miao Liu, Bin Wang
doaj +1 more source
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj +8 more
wiley +1 more source
The rapid expansion of the internet has led to a corresponding surge in malicious online activities, posing significant threats to users and organizations.
Shiyun Li, Omar Dib
doaj +1 more source
Rancang Bangun Keamanan Web Service Dengan Metode Ws-Security
Abstrak Web service menggunakan teknologi XML dalam melakukan pertukaran data. Umumnya penggunaan web service terjadi pertukaran data ataupun informasi penting yang perlu dijaga keamanannya.
Ari Muzakir, Ahmad Ashari
doaj +1 more source

