Results 61 to 70 of about 18,797 (191)
Fermi Observation of the transitional pulsar binary XSS J12270-4859
Because of the disappearance of its accretion disk since the time period around 2012 November--December, XSS J12270-4859 has recently been identified as, in addition to PSR J1023+0038, another transitional millisecond pulsar binary.
Wang, Zhongxiang, Xing, Yi
core +1 more source
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
This study reports the preparation of a novel biomaterial from a forestry residue - Xanthoceras sorbifolia shell (XSS) - by solvent modification. The effects of acid and base (hydrochloric acerbic, acetic acid, sodium hydroxide, ammonia water) and some ...
Linan Liu +5 more
doaj +1 more source
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li +3 more
doaj +1 more source
An LSTM based cross-site scripting attack detection scheme for Cloud Computing environments
Cloud Computing plays a pivotal role in facilitating the Internet of Things (IoT) and its diverse applications. Users frequently access and store data on remote servers in Cloud Computing environments through web browsers.
Xiaolong Li +7 more
doaj +1 more source
Augmenting the GTAP Database with Data on Inter-Regional Transactions [PDF]
This paper reports the results of an exercise to augment the GTAP database with information from the income and current transfers components of the current account of the balance of payments.
McDonald, S., Sonmez, Y.
core
Theoretical analyses of evolution strategies are indispensable for gaining a deep understanding of their inner workings. For constrained problems, rather simple problems are of interest in the current research.
Beyer, Hans-Georg, Spettel, Patrick
core +1 more source
ABSTRACT Developing Cu‐based composites that simultaneously achieve ultra‐high strength, ductility, and electrical conductivity remains critical for advanced electrical contact applications. In this work, multiphase AlCrCuFeNi2.5 high‐entropy alloy (HEA) reinforcements are incorporated into CuCrZr matrix via spark plasma sintering (SPS) and annealing ...
Tao Hong +8 more
wiley +1 more source
Efficient Detection of XSS and DDoS Attacks with Bent Functions
In this paper, we investigate the use of Bent functions, particularly the Maiorana–McFarland (M–M) construction, as a nonlinear preprocessing method to enhance machine learning-based detection systems for Distributed Denial of Service (DDoS) and Cross ...
Shahram Miri Kelaniki, Nikos Komninos
doaj +1 more source
Models and scenarios of implementation of threats for internet resources
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj +1 more source

