Results 61 to 70 of about 18,797 (191)

Fermi Observation of the transitional pulsar binary XSS J12270-4859

open access: yes, 2014
Because of the disappearance of its accretion disk since the time period around 2012 November--December, XSS J12270-4859 has recently been identified as, in addition to PSR J1023+0038, another transitional millisecond pulsar binary.
Wang, Zhongxiang, Xing, Yi
core   +1 more source

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Effects of Different Solvents on the Surface Acidic Oxygen-containing Functional Groups on Xanthoceras sorbifolia Shell

open access: yesBioResources, 2014
This study reports the preparation of a novel biomaterial from a forestry residue - Xanthoceras sorbifolia shell (XSS) - by solvent modification. The effects of acid and base (hydrochloric acerbic, acetic acid, sodium hydroxide, ammonia water) and some ...
Linan Liu   +5 more
doaj   +1 more source

Cross-Site Scripting Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining

open access: yesApplied Sciences, 2020
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li   +3 more
doaj   +1 more source

An LSTM based cross-site scripting attack detection scheme for Cloud Computing environments

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
Cloud Computing plays a pivotal role in facilitating the Internet of Things (IoT) and its diverse applications. Users frequently access and store data on remote servers in Cloud Computing environments through web browsers.
Xiaolong Li   +7 more
doaj   +1 more source

Augmenting the GTAP Database with Data on Inter-Regional Transactions [PDF]

open access: yes, 2004
This paper reports the results of an exercise to augment the GTAP database with information from the income and current transfers components of the current account of the balance of payments.
McDonald, S., Sonmez, Y.
core  

Analysis of the $(\mu/\mu_I,\lambda)$-CSA-ES with Repair by Projection Applied to a Conically Constrained Problem

open access: yes, 2019
Theoretical analyses of evolution strategies are indispensable for gaining a deep understanding of their inner workings. For constrained problems, rather simple problems are of interest in the current research.
Beyer, Hans-Georg, Spettel, Patrick
core   +1 more source

Hierarchical Strengthening Design in AlCrCuFeNi2.5/CuCrZr Composites Enables Strength–Ductility–Conductivity Synergy

open access: yesRare Metals, Volume 45, Issue 3, March 2026.
ABSTRACT Developing Cu‐based composites that simultaneously achieve ultra‐high strength, ductility, and electrical conductivity remains critical for advanced electrical contact applications. In this work, multiphase AlCrCuFeNi2.5 high‐entropy alloy (HEA) reinforcements are incorporated into CuCrZr matrix via spark plasma sintering (SPS) and annealing ...
Tao Hong   +8 more
wiley   +1 more source

Efficient Detection of XSS and DDoS Attacks with Bent Functions

open access: yesInformation
In this paper, we investigate the use of Bent functions, particularly the Maiorana–McFarland (M–M) construction, as a nonlinear preprocessing method to enhance machine learning-based detection systems for Distributed Denial of Service (DDoS) and Cross ...
Shahram Miri Kelaniki, Nikos Komninos
doaj   +1 more source

Models and scenarios of implementation of threats for internet resources

open access: yesРоссийский технологический журнал, 2020
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj   +1 more source

Home - About - Disclaimer - Privacy