Results 41 to 50 of about 149,520 (284)
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities
Algorithmic complexity vulnerabilities occur when the worst-case time/space complexity of an application is significantly higher than the respective average case for particular user-controlled inputs.
Betts A. +5 more
core +1 more source
Mayall:a framework for desktop JavaScript auditing and post-exploitation analysis [PDF]
Writing desktop applications in JavaScript offers developers the opportunity to write cross-platform applications with cutting edge capabilities. However in doing so, they are potentially submitting their code to a number of unsanctioned modifications ...
Bellekens, Xavier +3 more
core +4 more sources
A Note on Web Vulnerabilities [PDF]
This note provides a brief description of web application vulnerabilities and preventive measures.
openaire +1 more source
Objective The objective of this article is to identify perceptions of SLE patients regarding artificial intelligence (AI)‐based online symptom assessment tools, and the potential of these tools to address diagnostic barriers. Methods Adults from our SLE research cohort were invited to participate in 60‐90 minute virtual focus groups concerning their ...
Olivia A. Stein +7 more
wiley +1 more source
Unveiling XSS Threats: A Bipartite Graph Approach with Ensemble Deep Learning for Enhanced Detection
Cross-Site Scripting (XSS) attacks are a common source of vulnerability for web applications, necessitating scalable mechanisms for detection. In this work, a new method based on bipartite graph-based feature extraction and an ensemble learning ...
Wafa Alorainy
doaj +1 more source
This study presents a reversible temperature sensor with high switching ratio, ∼103. The device is fabricated using PET‐ITO and carbon nanotube dispersions in alkane. Considering its application in cold chain logistics, a proof‐of‐concept with LED is showcased. Thus, a temperature drop below the threshold temperature (crystallization temperature of the
Sunil Kumar Behera +8 more
wiley +1 more source
Strategies for Loading and Releasing Peptide Therapeutics in Biodegradable Carriers
A biodegradable carrier‐based peptide delivery system is a powerful treatment platform for diverse diseases, owing to its superior therapeutic efficacy and low toxicity. This review examines the conventional peptide‐loaded carrier fabrication process and its current limitations.
Wookyoung Jang, Ki Wan Bong
wiley +1 more source
DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS
QL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources.
Muhammad Fahmi Al Azhar, Ruki Harwahyu
doaj +1 more source
Electrolyte Design Strategies for Static Shuttle‐Free and Long‐Life Aqueous Zinc‐Iodine Batteries
This review systematically summarizes recent advances in electrolyte design for static aqueous Zn‐I2 batteries, highlighting solvation regulation and interfacial engineering strategies to control reaction kinetics, suppress iodine shuttling, enhance energy density, and stabilize multi‐electron iodine redox chemistry for durable, high‐performance energy
Qianqin Zhou +3 more
wiley +1 more source
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure.
Costin, Andrei +2 more
core +2 more sources

