Results 51 to 60 of about 3,038 (211)
A Real-Time Hybrid Approach to Combat In-Browser Cryptojacking Malware
Cryptojacking is a type of computer piracy in which a hacker uses a victim’s computer resources, without their knowledge or consent, to mine for cryptocurrency.
Muhammad Haris Khan Abbasi +3 more
doaj +1 more source
SEARCH METHODS FOR ABNORMAL ACTIVITIES OF WEB APPLICATIONS [PDF]
Subject of Research.The paper presents a review of existing detection methods for abnormal activities of web applications. Comparative characteristics are given.
Olesia I. Mikheeva +4 more
doaj +1 more source
Rheagogies: modelling non-trophic effects in food webs [PDF]
In a food web, nutrients flow via trophic links. For this reason, trophic interactions have a fundamental character due to the principle of mass conservation.
Arditi, R. +2 more
core +1 more source
Mechanising and evolving the formal semantics of WebAssembly: the Web's new low-level language [PDF]
WebAssembly is the first new programming language to be supported natively by all major Web browsers since JavaScript. It is designed to be a natural low-level compilation target for languages such as C, C++, and Rust, enabling programs written in these ...
Watt, Conrad
core +1 more source
Online laboratories and computational notebooks have established themselves as essential tools in the fields of engineering and science education, significantly enhancing the teaching and learning experience.
Oswaldo Vanegas-Guillen +4 more
doaj +1 more source
Joint Function Deployment Optimization Method for WebAssembly and Containers Based on Longest Latency-Weighted Bandwidth [PDF]
Container technology has been widely used in the oblivious computing platform of edge servers due to its advantages such as lightweight nature,easy deployment,and high availability.However,with the increasing demand for low-latency in applications,the ...
CHEN Ranzhao, LI Zhexiong, GU Lin, ZHONG Liang, ZENG Deze
doaj +1 more source
Real-Time Flood Mapping on Client-Side Web Systems Using HAND Model
The height above nearest drainage (HAND) model is frequently used to calculate properties of the soil and predict flood inundation extents. HAND is extremely useful due to its lack of reliance on prior data, as only the digital elevation model (DEM) is ...
Anson Hu, Ibrahim Demir
doaj +1 more source
Overview of Polkadot and its Design Considerations [PDF]
In this paper we describe the design components of the heterogenous multi-chain protocol Polkadot and explain how these components help Polkadot address some of the existing shortcomings of blockchain technologies. At present, a vast number of blockchain
Alper, Handan Kilinc +10 more
core +1 more source
ret2spec: Speculative Execution Using Return Stack Buffers
Speculative execution is an optimization technique that has been part of CPUs for over a decade. It predicts the outcome and target of branch instructions to avoid stalling the execution pipeline.
Acıiccmez Onur +11 more
core +1 more source
Deceptive bytes: An in-depth evaluation of WebAssembly obfuscation for evading crypto mining detection [PDF]
WebAssembly er et lavnivå bytekode-språk som lar høyere nivå språk som C, C++ og Rust kjøre i nettleseren med høy ytelse. Det brukes allerede i stor grad og støttes i alle moderne nettlesere.
Harnes, Håkon
core

