Results 61 to 70 of about 149,520 (284)
The perspective presents an integrated view of neuromorphic technologies, from device physics to real‐time applicability, while highlighting the necessity of full‐stack co‐optimization. By outlining practical hardware‐level strategies to exploit device behavior and mitigate non‐idealities, it shows pathways for building efficient, scalable, and ...
Kapil Bhardwaj +8 more
wiley +1 more source
Software vulnerabilities in web applications are one of the sensitive points in data and application security. Although closing a vulnerability after it is detected in web applications seems to be a solution, detecting vulnerabilities in the source code ...
Remzi Gürfidan
doaj +1 more source
The power and vulnerability of the ‘new professional’: Web management in UK universities
Research paper Purpose: To explore the character of an emergent occupational role, that of university web manager. Design/methodology/approach: The primary data used were 15 semi-structured interviews conducted in 2004.
Cox, A.M.
core +1 more source
Leaftronics: Bio‐Fractal Scaffolds From Leaf Venation for Low‐Waste Electronics
“Leaftronics” transforms naturally evolved leaf venation into quasi‐fractal scaffolds for sustainable electronics. Polymer‐infiltrated leaf skeletons can be used to fabricate ultra‐smooth, reflow‐ and thin‐film‐compatible decomposable substrates, while making the same lignocellulose networks conducting results in flexible transparent electrodes.
Rakesh Rajendran Nair +3 more
wiley +1 more source
An Empirical Analysis of Vulnerabilities in Python Packages for Web Applications
This paper examines software vulnerabilities in common Python packages used particularly for web development. The empirical dataset is based on the PyPI package repository and the so-called Safety DB used to track vulnerabilities in selected packages ...
Ruohonen, Jukka
core +1 more source
Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks
Detection and mitigation of critical web vulnerabilities and attacks like cross-site scripting (XSS), and cross-site request forgery (CSRF) have been a great concern in the field of web security. Such web attacks are evolving and becoming more challenging to detect.
openaire +2 more sources
AI–Guided 4D Printing of Carnivorous Plants–Inspired Microneedles for Accelerated Wound Healing
This work presents an artificial intelligence (AI)‐guided 4D‐printed microneedle platform inspired by carnivorous plants for wound healing. A thermo‐responsive shape memory polymer enables body temperature–triggered self‐coiling for autonomous wound closure.
Hyun Lee +21 more
wiley +1 more source
Research and implementation of fuzzing testing based on HTTP proxy
Most of the security testing tools lack of optimization of testing,configured strategy and intelligent analysis of testing results.These problems lead to the status that these tools can’t be used in Web application testing well.A fuzzing testing method ...
Xin SUN,Xin-dai LU +2 more
doaj +3 more sources
Web Security Detection Tool [PDF]
According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]
Agashe, Abhishek
core +1 more source
This review traces the evolution of lithium‐ion battery separators from passive barriers to multifunctional components central to cell safety and performance. Polymer‐ceramic hybrids, nanofiber architectures, and bio‐derived membranes deliver ionic conductivities above 3 mS cm−1, thermal stability beyond 200 °C, and effective suppression of lithium ...
Karthik Vishweswariah +5 more
wiley +1 more source

