Results 31 to 40 of about 149,520 (284)

Evaluating the web‐application resiliency to business‐layer DoS attacks

open access: yesETRI Journal, 2019
A denial‐of‐service (DoS) attack is a serious attack that targets web applications. According to Imperva, DoS attacks in the application layer comprise 60% of all the DoS attacks. Nowadays, attacks have grown into application‐ and business‐layer attacks,
Mitra Alidoosti   +2 more
doaj   +1 more source

A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)

open access: yes, 2017
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando   +4 more
core   +1 more source

An Enhanced Rule-Based Web Scanner Based on Similarity Score

open access: yesAdvances in Electrical and Computer Engineering, 2016
This paper proposes an enhanced rule-based web scanner in order to get better accuracy in detecting web vulnerabilities than the existing tools, which have relatively high false alarm rate when the web pages are installed in unconventional directory ...
LEE, M., LEE, Y., YOON, H.
doaj   +1 more source

Quantitative proteomic analysis reveals different characteristics of bladder cancer cells after exposure to bisphenol A

open access: yesFEBS Open Bio, EarlyView.
Bisphenol A (BPA), a common chemical in plastics, exerts dual effects on bladder cancer cells: low doses promote growth and migration, while high doses suppress growth and migration. Multi‐omics and bioinformatics reveal BPA acts via MAPK and inflammatory pathways.
Shaomin Niu   +10 more
wiley   +1 more source

Super‐Refractory Status Epilepticus (SRSE) in a Patient With Compound Heterozygous OPA1 Variants: Case Report and Literature Review

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Super‐Refractory Status Epilepticus (SRSE) is a rare, life‐threatening neurological emergency with unclear etiology in many cases. Mitochondrial dysfunction, often due to disease‐causing genetic variants, is increasingly recognized as a cause, with each gene producing distinct pathophysiological mechanisms.
Pouria Mohammadi   +2 more
wiley   +1 more source

Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]

open access: yes, 2012
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu   +2 more
core  

Using web security scanners to detect vulnerabilities in web services [PDF]

open access: yes2009 IEEE/IFIP International Conference on Dependable Systems & Networks, 2009
Although web services are becoming business-critical components, they are often deployed with critical software bugs that can be maliciously explored. Web vulnerability scanners allow detecting security vulnerabilities in web services by stressing the service from the point of view of an attacker.
Marco Vieira   +2 more
openaire   +1 more source

Von Economo Neuron Loss in Frontotemporal Dementia: A Meta‐Analysis of Neuropathological Studies

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Von Economo neurons (VENs) have been reported to be vulnerable to neurodegeneration in frontotemporal dementia (FTD), particularly the behavioral variant (bvFTD), but these findings have not been systematically assessed across independent brain banks.
Daniel Talmasov   +2 more
wiley   +1 more source

Machine Learning-Driven Detection of Cross-Site Scripting Attacks

open access: yesInformation
The ever-growing web application landscape, fueled by technological advancements, introduces new vulnerabilities to cyberattacks. Cross-site scripting (XSS) attacks pose a significant threat, exploiting the difficulty of distinguishing between benign and
Rahmah Alhamyani, Majid Alshammari
doaj   +1 more source

Web Access Control Vulnerability Detection Approach Based on Site Maps [PDF]

open access: yesJisuanji kexue
Attackers usually exploit access control vulnerabilities in web applications to gain unauthorized access to systems or engage in malicious activities such as data theft.Existing methods for detecting access control vulnerabilities in web applications ...
REN Jiadong, LI Shangyang, REN Rong, ZHANG Bing, WANG Qian
doaj   +1 more source

Home - About - Disclaimer - Privacy