Results 21 to 30 of about 18,797 (191)

MACROSCOPIC CROSS SECTIONS GENERATION BY MONTE CARLO CODE MCS FOR FAST REACTOR ANALYSIS [PDF]

open access: yesEPJ Web of Conferences, 2021
Recent researches have become more interested in the feasibility of using Monte Carlo (MC) code to generate multi-group (MG) cross sections (XSs) for fast reactor analysis using nodal diffusion codes.
Nguyen Tung Dong Cao   +5 more
doaj   +1 more source

MNN-XSS: Modular Neural Network Based Approach for XSS Attack Detection [PDF]

open access: yesComputers, Materials & Continua, 2022
Abstract: The rapid growth and uptake of network-based communication technologies have made cybersecurity a significant challenge as the number of cyber-attacks is also increasing. A number of detection systems are used in an attempt to detect known attacks using signatures in network traffic.
Alqarni, Ahmed Abdullah   +5 more
openaire   +1 more source

Analisis Kerentanan XSS dan Rate Limiting Pada Website SMAN 8 Denpasar Menggunakan Framework OWASP ZAP

open access: yesJurnal informatika UPGRIS, 2022
Pada era digital sekarang hampir semua orang mengakses internet, Website merupakan salah satu situs yang ada di internet yang dapat menyimpan dan menyebarkan segala informasi.
Gede Angga Septiawan   +3 more
doaj   +1 more source

Vicious XSS [PDF]

open access: yesQueue, 2005
For readers who doubt the relevance of KV’s advice, witness the XSS attack that befell MySpace in October. This month Kode Vicious addresses just this sort of XSS attack. It’s a good thing cross-site scripting is not abbreviated CSS, as the MySpace hacker used CSS to perpetrate his XSS attack. That would have made for one confusing story, eh?
openaire   +2 more sources

State-Sensitive Black-Box Web Application Scanning for Cross-Site Scripting Vulnerability Detection

open access: yesApplied Sciences, 2023
Black-box web application scanning has been a popular technique to detect Cross-Site Scripting (XSS) vulnerabilities without prior knowledge of the application. However, several limitations lead to low efficiency of current black-box scanners, including (
Tianxiang Zhang   +4 more
doaj   +1 more source

X-ray Observations of XSS J12270-4859 in a New Low State: A Transformation to a Disk-Free Rotation-Powered Pulsar Binary [PDF]

open access: yes, 2014
We present XMM-Newton and Chandra observations of the low-mass X-ray binary XSS J12270--4859, which experienced a dramatic decline in optical/X-ray brightness at the end of 2012, indicative of the disappearance of its accretion disk.
Stappers, Benjamin   +7 more
core   +3 more sources

Pointwise cross-section-based on-the-fly resonance interference treatment with intermediate resonance approximation

open access: yesNuclear Engineering and Technology, 2015
The effective cross sections (XSs) in the direct whole core calculation code nTRACER are evaluated by the equivalence theory-based resonance-integral-table method using the WIMS-based library as an alternative to the subgroup method.
Meer Bacha, Han Gyu Joo
doaj   +1 more source

Identification of four RXTE Slew Survey sources with nearby luminous active galactic nuclei [PDF]

open access: yes, 2005
Based on RXTE scans and observations with the SWIFT/XRT telescope and INTEGRAL observatory, we report the identification of four X-ray sources discovered during the RXTE Slew Survey of the |b|>10deg sky with nearby (z ~ 0.017-0.098) luminous (log L_2 ...
Dickey   +10 more
core   +1 more source

The intriguing nature of the high energy gamma ray source XSSJ12270-4859 [PDF]

open access: yes, 2010
The nature of the hard X-ray source XSSJ12270-4859 is still unclear though it was claimed to be a magnetic Cataclysmic Variable. We here present a broad-band X-ray and gamma ray study based on a recent XMM-Newton observation and archival INTEGRAL and ...
Abdo   +38 more
core   +5 more sources

Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Web applications’ popularity has raised attention in various service domains, which increased the concern about cyber-attacks. One of these most serious and frequent web application attacks is a Cross-site scripting attack (XSS).
Isam Kareem Thajeel   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy