Results 41 to 50 of about 2,510 (186)
A Portable and Secure Package Format for Executable Simulation Modules based on WebAssembly [PDF]
We propose a new format (Digital Twin Assembly - dtasm) for self-contained executable co-simulation modules that is portable and sandboxed, yet offers performance close to native machine code and is sufficiently lightweight for running on embedded ...
Allmaras, Moritz +3 more
core +2 more sources
Audio and Music Analysis on the Web using Essentia.js
Open-source software libraries have a significant impact on the development of Audio Signal Processing and Music Information Retrieval (MIR) systems. Despite the abundance of such tools, there is a lack of an extensive and easy-to-use reference library ...
Albin Correya +5 more
doaj +1 more source
Comparing Security in eBPF and WebAssembly [PDF]
This paper examines the security of eBPF and WebAssembly (Wasm), two technologies that have gained widespread adoption in recent years, despite being designed for very different use cases and environments. While eBPF is a technology primarily used within
Dejaeghere, Jules +3 more
core +1 more source
Verification of WebAssembly programs
Agencia Nacional de Investigación e ...
openaire +2 more sources
Client Puzzle Protocols as Countermeasure Against Automated Threats to Web Applications
Proof-of-work (PoW) schemes implemented in client puzzle protocols (CPPs) have been proposed as a protection from Denial-of-Service (DoS) attacks against internet facing servers.
Vladimir Bostanov
doaj +1 more source
Rasm: Compiling Racket to WebAssembly [PDF]
WebAssembly is an instruction set designed for a stack based virtual machine, with an emphasis on speed, portability and security. As the use cases for WebAssembly grow, so does the desire to target WebAssembly in compilation.
Matejka, Grant
core +1 more source
Security and privacy issues in blockchain and its applications
IET Blockchain, Volume 3, Issue 4, Page 169-171, December 2023.
Liangmin Wang +4 more
wiley +1 more source
A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware
Cryptojacking is a type of computer piracy in which a hacker uses a victim’s computer resources, without their knowledge or consent, to mine for cryptocurrency.
Muhammad Haris Khan Abbasi +3 more
doaj +1 more source
SEARCH METHODS FOR ABNORMAL ACTIVITIES OF WEB APPLICATIONS [PDF]
Subject of Research.The paper presents a review of existing detection methods for abnormal activities of web applications. Comparative characteristics are given.
Olesia I. Mikheeva +4 more
doaj +1 more source
Unwind: Interactive Fish Straightening
The ScanAllFish project is a large-scale effort to scan all the world's 33,100 known species of fishes. It has already generated thousands of volumetric CT scans of fish species which are available on open access platforms such as the Open Science ...
Chen M. +15 more
core +1 more source

