Results 81 to 90 of about 149,520 (284)

Ghera: A Repository of Android App Vulnerability Benchmarks

open access: yes, 2017
Security of mobile apps affects the security of their users. This has fueled the development of techniques to automatically detect vulnerabilities in mobile apps and help developers secure their apps; specifically, in the context of Android platform due ...
Arzt Steven   +4 more
core   +1 more source

Web based Vulnerabilities Modulation: A Comprehensive Study on Web Vulnerabilities

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
In today's digital landscape, where online activities like banking, shopping, and social networking dominate, the security of sensitive data and assets is paramount. This responsibility primarily lies with software and web developers, tasked with safeguarding against prevalent vulnerabilities such as SQL injection, XSS (Cross-Site Scripting), Broken ...
openaire   +1 more source

Corals and Reef‐Dwelling Fish Regulate Carbon Storage and Cycling Processes in Coral Reef Ecosystems

open access: yesAdvanced Science, EarlyView.
Coral reefs are biodiversity hotspots, yet their role in carbon storage and cycling remains poorly understood. Using field surveys and modeling in the South China Sea, we reveal the overlooked potential of carbon storage in reef ecosystems and how reef fish, corals, and surface sediment jointly shape reef carbon reservoirs.
Yiting Chen   +8 more
wiley   +1 more source

Comparative Analysis of Penetration Testing Frameworks: OWASP, PTES, and NIST SP 800-115 for Detecting Web Application Vulnerabilities

open access: yesJournal of Applied Informatics and Computing
Web application security faces increasingly complex challenges as digital architectures evolve, necessitating the selection of appropriate and effective penetration testing methods.
Muhamad Bunan Imtias   +3 more
doaj   +1 more source

T Cell Exhaustion in Cancer Immunotherapy: Heterogeneity, Mechanisms, and Therapeutic Opportunities

open access: yesAdvanced Science, EarlyView.
T cell exhaustion limits immunotherapy efficacy. This article delineates its progression from stem‐like to terminally exhausted states, governed by persistent antigen, transcription factors, epigenetics, and metabolism. It maps the exhaustion landscape in the TME and proposes integrated reversal strategies, providing a translational roadmap to overcome
Yang Yu   +7 more
wiley   +1 more source

Statistical Analysis of Unique Web Application Vulnerabilities: A Quantitative Assessment of Scanning Tool Efficiency

open access: yesSEEU Review
Web application security is a critical aspect of modern cybersecurity, necessitating efficient and reliable vulnerability detection mechanisms. This study presents a quantitative analysis of unique web application vulnerabilities detected by four ...
Zogaj Gani   +3 more
doaj   +1 more source

Comparison of the effectiveness of tools for testing the security of web applications

open access: yesJournal of Computer Sciences Institute
This article presents a comparative analysis of the effectiveness of three web application security scanners: ZAP, Wapiti, and Skipfish. Automated scanning was conducted on deliberately unsecured applications, followed by an analysis of the detected ...
Izabela Kaźmierak
doaj   +1 more source

The Study into Cross-Site Request Forgery Attacks within the Framework of Analysis of Software Vulnerabilities

open access: yesТруды Института системного программирования РАН, 2018
Nowadays, web applications are one of the most popular types of target of evaluation within the framework of the information security certification. The relevance of the study of web applications vulnerabilities during information security certification ...
A. V. Barabanov   +4 more
doaj   +1 more source

Study of Free‐Space Optical Quantum Network: Review and Prospectives

open access: yesAdvanced Science, EarlyView.
Free from the constraints of fiber connections, free‐space quantum network enables longer and more flexible quantum network connections. This review summarizes and comparatively analyzes free‐space quantum network experiments based on ground stations, satellites, and mobile platforms.
Hua‐Ying Liu, Zhenda Xie, Shining Zhu
wiley   +1 more source

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

open access: yes, 2017
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy