Showing 141 - 160 results of 171 for search '"web application"', query time: 0.07s Refine Results
  1. 141

    Future network application scenarios and network capability requirements by Linghao WANG, Miao WANG, Yawen ZHANG, Yujun ZHANG

    Published 2019-10-01
    “…The TCP/IP based internet had evolved into an important infrastructure for current information society.However,with the rapid growth of network traffic and the appearance of various emerging applications,the existing network architecture had become increasingly prominent in all aspects.Analyzing and clearing the performance needs of emerging Web applications could provide a clearer direction for the research on network architecture.The application scenarios of typical future network applications were analyzed such as immersive experience applications,IoT applications,tactile internet applications and intelligent transportation applications.The future network applications’ requirements for future networks were summarized,and key network performance indicators were derived.…”
    Get full text
    Article
  2. 142

    Approach to detecting SQL injection behaviors in network environment by Yu-fei ZHAO, Gang XIONG, Long-tao HE, Zhou-jun LI

    Published 2016-02-01
    “…SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers. …”
    Get full text
    Article
  3. 143

    Efficiency comparison of message brokers by Sebastian Dyjach, Małgorzata Plechawska-Wójcik

    Published 2024-06-01
    “… The aim of the article is to compare three main brokers used in the development of web applications: RabbitMQ, Apache Kafka and Apache Pulsar. …”
    Get full text
    Article
  4. 144

    Situation Analytics and Model-based User Interface Development: A Synergetic Approach for Building Runtime-Adaptive Business Applications by Christian Märtin, Felix Kampfer, Christian Herdin, Lionnelle Biawan Yameni

    Published 2019-10-01
    “…The situation recognition capabilities and adaptive functionality of the system are demonstrated for web-applications for long-distance travel booking and a beauty products web-portal.…”
    Get full text
    Article
  5. 145

    Données ouvertes liées et recherche historique : un changement de paradigme by Francesco Beretta

    Published 2023-07-01
    “…We then present the infrastructure projects carried out at the Larhra (Laboratoire de recherche historique Rhône-Alpes) with the aim of facilitating the digital transition: symogih.org, ontome.net, geovistory.org. These Web applications are developed in line with the epistemology of the historical sciences and contribute to the realisation of a disciplinary “information graph”.…”
    Get full text
    Article
  6. 146

    A STUDY ON SECURITY FOR WEB-BASED APPLICATIONS by Nguyễn Sĩ Hòa, Lại Thị Nhung, Đặng Thanh Hải

    Published 2017-06-01
    “…Therefore, studying the risks for Web-based applications is the urgent need for organizations deploying web applications on the Internet. In this article, we will analyze the most common vulnerabilities of Web-based applications and recommend methods for detection.…”
    Get full text
    Article
  7. 147

    Fault-Tolerant Partition Resolvability of Cyclic Networks by Kamran Azhar, Sohail Zafar, Agha Kashif, Michael Onyango Ojiema

    Published 2021-01-01
    “…The interaction and interconnection between devices, sensors, and service providers have opened the door for an eruption of mobile over the web applications. Structure of web sites containing number of pages can be represented using graph, where web pages are considered to be the vertices, and an edge is a link between two pages. …”
    Get full text
    Article
  8. 148

    Detecting P2P botnet based on the role of flows by Yuan-zhang SONG, Jun-ting HE, Bo ZHANG, Jun-jie WANG, An-bang WANG

    Published 2012-09-01
    “…Towards the weaknesses of the existing detection methods of P2P botnet,a novel real-time detection model based on the role of flows was proposed,which was named as RF.According to the characteristics of flows,the model made the flows play the different roles in the detection of the P2P botnet to detect the essential abnormality and the attacking abnormality.And the model considered the influence on the detection of the P2P botnet which the Web applications generated,especially the applications based on the P2P protocols.To minimize the false positive rate and false negative rate,a real-time method based on the sliding window to estimate the Hurst parameter was proposed,and the Kaufman algorithm was applied to adjust the threshold dynamically.The experiments showed that the model was able to detect the new P2P botnet with a relatively high precision.…”
    Get full text
    Article
  9. 149

    Forecasting Alisadr Cave Tourism Demand using Combination of Short-term and Long-term Forecasts by Elaheh Malekzadeh Hamedani, Marjan Kaedi, Zahra Zojaji

    Published 2022-07-01
    “…The predictive models obtained from this study can enhance customer service and improve the interaction between users and tourist ticketing web applications and online reservation programs. …”
    Get full text
    Article
  10. 150

    Sistem Pendeteksi Banjir dan Badai Angin serta Monitoring Cuaca Berbasis Internet of Things by Ida Bagus Made Lingga Pradirta, I Nyoman Piarsa, I Putu Arya Dharmaadi

    Published 2022-10-01
    “…The measurement results of the prototype tool produce a fairly good and accurate test consisting of testing the entire sensor, calibrating each sensor, and sending data to the server, as well as testing the software contained in every function of Android and web applications that can run optimally. …”
    Get full text
    Article
  11. 151

    Efficiency of Semantic Web Implementation on Cloud Computing: A Review by Kazheen Ismael Taher, Rezgar Hasan Saeed, Rowaida Kh. Ibrahim, Zryan Najat Rashid, Lailan M. Haji, Naaman Omar, Hivi Ismat Dino

    Published 2021-06-01
    “…In addition, a "cloud-driven" mode of interaction illustrates how we can construct the semantic web and provide automated semantical annotations to web applications on a large scale by leveraging Cloud computing properties and advantages. …”
    Get full text
    Article
  12. 152

    Penetration test method using blind SQL injection based on second-order fragment and reassembly by De-guang LE, Sheng-rong GONG, Shao-gang WU, Feng XU, Wen-sheng LIU

    Published 2017-10-01
    “…How to get rid of the blindness of current SQL injection penetration test,produce the optimized attack pattern of SQL injection,enhance the effectiveness in the phase of attack generation,and improve the accuracy of vulnerability detection of SQL injection using penetration test,is a big challenge.In order to resolve these problems,a new penetration test method using blind SQL injection was proposed based on second-order fragment and reassembly.In this method,the SQL injection attack model was built firstly and then the multiform and multi-type attack patterns of SQL injection penetration test driven by the SQL injection attack model was produced,which can reduce the blindness of SQL injection penetration test and improve the accuracy of SQL injection vulnerability detection.The experiments of SQL injection vulnerability detection was conducted through the actual Web applications by using proposed method in comparison with current methods.The analysis results of test show the proposed method is better compared with other methods,which not only proves the effectiveness of proposed method,but also improve the accuracy of SQL injection vulnerability detection by reducing false negative in the defensive environment.…”
    Get full text
    Article
  13. 153

    Co-creating public value into digital-based public service innovation in the village governance by Siti Hajar, Nur Ambia Arma

    Published 2024-12-01
    “…The form of innovation in optimizing digital-based public services in Hamparan Perak Village is the application of web applications. This will strengthen the co-creation of public value derived from the level of community satisfaction through community trust and support for the implementation of web-based governance in Hamparan Perak Village.…”
    Get full text
    Article
  14. 154

    SQL Injection Detection Based on Lightweight Multi-Head Self-Attention by Rui-Teng Lo, Wen-Jyi Hwang, Tsung-Ming Tai

    Published 2025-01-01
    “…This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size. …”
    Get full text
    Article
  15. 155

    An Automatic Web Service Composition Framework Using QoS-Based Web Service Ranking Algorithm by Deivamani Mallayya, Baskaran Ramachandran, Suganya Viswanathan

    Published 2015-01-01
    “…Web service has become the technology of choice for service oriented computing to meet the interoperability demands in web applications. In the Internet era, the exponential addition of web services nominates the “quality of service” as essential parameter in discriminating the web services. …”
    Get full text
    Article
  16. 156

    Research on the design and application of role-resource based access control model by LAI Tianping, WANG Yongchao, LUO Pan, GAO Zhitong

    Published 2024-11-01
    “…The traditional role-based access control (RBAC) model plays a crucial role in permission management but faces challenges in Web applications, such as lack of resource definition, permission explosion, and permission leakage. …”
    Get full text
    Article
  17. 157

    WEB VULNERABILITIES DETECTION USING A HYBRID MODEL OF CNN, GRU AND ATTENTION MECHANISM by Sarbast H. Ali, Arman I. Mohammed, Sarwar MA. Mustafa, Sardar Omar Salih

    Published 2025-01-01
    “…These results significantly outperform the state-of-the-art models and can strongly identify vulnerabilities in web applications. Through training, on both the SXCM1 and DPU-WVD datasets, the model achieved an accuracy rate of 99.99%. …”
    Get full text
    Article
  18. 158

    τJOWL: A Systematic Approach to Build and Evolve a Temporal OWL 2 Ontology Based on Temporal JSON Big Data by Zouhaier Brahmia, Fabio Grandi, Rafik Bouaziz

    Published 2022-12-01
    “…Big data are being widely stored and exchanged in JavaScript Object Notation (JSON) format, in particular by Web applications. However, JSON data collections lack explicit semantics as they are in general schema-less, which does not allow to efficiently leverage the benefits of big data. …”
    Get full text
    Article
  19. 159

    A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks by Mohammed A. Saleh, Azizah Abdul Manaf

    Published 2015-01-01
    “…Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.…”
    Get full text
    Article
  20. 160

    Designing Development Readiness Indicators and Roadmap for Petaflops Scale Supercomputers by Davood Maleki, Mohammad Reza Ahmadi, Alireza Mansouri, Ehsan Arianyan

    Published 2022-07-01
    “…Recently, supercomputers and high-performance computing (HPC) have caused significant progress in many fields, including industrial and research fields of artificial intelligence, data science, big data, Internet of Things, as well as large scale web applications. Regarding this characteristic, the supercomputer field becomes one of the strategic issues in developed and developing countries. …”
    Get full text
    Article