Results 81 to 90 of about 4,673,218 (333)

A Web Second-Order Vulnerabilities Detection Method

open access: yesIEEE Access, 2018
Second-order vulnerabilities are more subtle and more destructive than the first-order vulnerabilities. After researching and analyzing the principles of web penetration testing and second-order attack principles, this paper proposes a method to detect ...
Miao Liu, Bin Wang
doaj   +1 more source

Solvent‐Free Bonding Mechanisms and Microstructure Engineering in Dry Electrode Technology for Lithium‐Ion Batteries

open access: yesAdvanced Functional Materials, EarlyView.
Dry electrode technology revolutionizes battery manufacturing by eliminating toxic solvents and energy‐intensive drying. This work details two promising techniques: dry spray deposition and polymer fibrillation. How their unique solvent‐free bonding mechanisms create uniform microstructures for thicker, denser electrodes, boosting energy density and ...
Yuhao Liang   +7 more
wiley   +1 more source

E-commerce Systems and E-shop Web Sites Security [PDF]

open access: yes
Fruitfulnes of contemporary companies rests on new business model development, elimination of communication obstacles, simplification of industrial processes, possibilities of responding in real-time and above all meeting the floating custom needs. Quite
Suchánek, Petr
core   +1 more source

Rancang Bangun Keamanan Web Service Dengan Metode Ws-Security

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2012
Abstrak Web service menggunakan teknologi XML dalam melakukan pertukaran data. Umumnya penggunaan web service terjadi pertukaran data ataupun informasi penting yang perlu dijaga keamanannya.
Ari Muzakir, Ahmad Ashari
doaj   +1 more source

Spectrally Tunable 2D Material‐Based Infrared Photodetectors for Intelligent Optoelectronics

open access: yesAdvanced Functional Materials, EarlyView.
Intelligent optoelectronics through spectral engineering of 2D material‐based infrared photodetectors. Abstract The evolution of intelligent optoelectronic systems is driven by artificial intelligence (AI). However, their practical realization hinges on the ability to dynamically capture and process optical signals across a broad infrared (IR) spectrum.
Junheon Ha   +18 more
wiley   +1 more source

Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces

open access: yes, 2015
Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure.
Costin, Andrei   +2 more
core   +2 more sources

Enhancing Online Security: A Novel Machine Learning Framework for Robust Detection of Known and Unknown Malicious URLs

open access: yesJournal of Theoretical and Applied Electronic Commerce Research
The rapid expansion of the internet has led to a corresponding surge in malicious online activities, posing significant threats to users and organizations.
Shiyun Li, Omar Dib
doaj   +1 more source

Shape‐Morphing Nanoengineered Hydrogel Ribbons as Hemostats

open access: yesAdvanced Functional Materials, EarlyView.
This study introduces a self‐assembling, shape‐morphing nanoengineered hydrogel ribbon system that rapidly forms porous aggregates in situ for efficient hemostasis in trauma and surgical applications. Abstract Rapid and effective hemorrhage control remains a major challenge in trauma and surgical care, particularly for complex or noncompressible wounds.
Ryan Davis Jr   +9 more
wiley   +1 more source

Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users [PDF]

open access: yes, 2011
Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension.
Cook, David   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy