Showing 21 - 40 results of 171 for search '"web application"', query time: 0.05s Refine Results
  1. 21

    Blending Static and Dynamic Analysis for Web Application Vulnerability Detection: Methodology and Case Study by Paulo Nunes, Jose Fonseca, Marco Vieira

    Published 2025-01-01
    “…Static Analysis (SA) and Dynamic Analysis (DA) are complementary techniques for searching web application vulnerabilities. Typically, SA detects more vulnerabilities but reports a higher number of false positives, whereas DA finds less but with better precision. …”
    Get full text
    Article
  2. 22

    RASP based Web security detection method by Hang YU, Shuai WANG, Huamin JIN

    Published 2020-11-01
    Subjects: “…Web application…”
    Get full text
    Article
  3. 23
  4. 24

    EpigenomeViewer: A Shiny Web Application for Visualizing Methylation Patterns Across Biological Samples by Nurul Syakima Ab Mutalib

    Published 2025-02-01
    “…EpigenomeViewer is a Shiny web application developed to address this gap by providing a comprehensive platform for visualising DNA methylation patterns across tumour and normal biological samples. …”
    Get full text
    Article
  5. 25

    Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security by Lu Zhexi

    Published 2025-01-01
    “…A pervasive security issue in web applications is database injection, enabling attackers to alter SQL queries in order to get unauthorized access to confidential information. …”
    Get full text
    Article
  6. 26

    Examination of the performance and scalability of a web application in a reactive and imperative approach using the Spring Framework by Karol Lis, Jakub Smołka

    Published 2024-09-01
    “… The purpose of this paper was to test the performance and scalability of a web application written in reactive and imperative approaches using the Spring Framework, in order to understand the differences between these approaches and choose the technology that best meets the requirements and provides optimal performance. …”
    Get full text
    Article
  7. 27
  8. 28
  9. 29

    Method and Algorithm for Processing Large Volume Images by O. N. Andreichuk, N. I. Listopad

    Published 2023-12-01
    Subjects: “…web application…”
    Get full text
    Article
  10. 30

    Google Apps Script : Web application development essentials / by Ferreira, James

    Published 2014
    View in OPAC
    Book
  11. 31

    Performance analysis of web application client layer development tools us-ing Angular, React and Vue as examples by Damian Bogusz, Paweł Ciszewski, Beata Pańczyk

    Published 2024-09-01
    “… The article presents a comparative analysis of tools for developing the client layer of web applications. The tools chosen for it were Angular 17.1.0, React 18.2.0 and Vue 3.3.4. …”
    Get full text
    Article
  12. 32

    Survey of side channel attack on encrypted network traffic by Ding LI, Yuefei ZHU, Bin LU, Wei LIN

    Published 2021-08-01
    Subjects: “…web application…”
    Get full text
    Article
  13. 33
  14. 34

    3D Web Application of Wind Prediction Under Typhoon on Coastal Cities Based on Ensemble k-NN and OpenFOAM by Mamad Tamamadin, Seong-Hoon Kee, Jurng-Jae Yee

    Published 2025-01-01
    “…The simulation results are disseminated in a 3D web application framework using Node JS for the web framework, PostgreSQL and PostGIS for database management, and CesiumJS for the main JavaScript library of 3D visualization. …”
    Get full text
    Article
  15. 35
  16. 36
  17. 37
  18. 38

    GenSQLi: A Generative Artificial Intelligence Framework for Automatically Securing Web Application Firewalls Against Structured Query Language Injection Attacks by Vahid Babaey, Arun Ravindran

    Published 2024-12-01
    “…The widespread adoption of web services has heightened exposure to cybersecurity threats, particularly SQL injection (SQLi) attacks that target the database layers of web applications. Traditional Web Application Firewalls (WAFs) often fail to keep pace with evolving attack techniques, necessitating adaptive defense mechanisms. …”
    Get full text
    Article
  19. 39
  20. 40