-
141
Future network application scenarios and network capability requirements
Published 2019-10-01“…The TCP/IP based internet had evolved into an important infrastructure for current information society.However,with the rapid growth of network traffic and the appearance of various emerging applications,the existing network architecture had become increasingly prominent in all aspects.Analyzing and clearing the performance needs of emerging Web applications could provide a clearer direction for the research on network architecture.The application scenarios of typical future network applications were analyzed such as immersive experience applications,IoT applications,tactile internet applications and intelligent transportation applications.The future network applications’ requirements for future networks were summarized,and key network performance indicators were derived.…”
Get full text
Article -
142
Approach to detecting SQL injection behaviors in network environment
Published 2016-02-01“…SQL injection attack is one of the main threats that many Web applications faced with. The traditional detection method depended on the clients or servers. …”
Get full text
Article -
143
Efficiency comparison of message brokers
Published 2024-06-01“… The aim of the article is to compare three main brokers used in the development of web applications: RabbitMQ, Apache Kafka and Apache Pulsar. …”
Get full text
Article -
144
Situation Analytics and Model-based User Interface Development: A Synergetic Approach for Building Runtime-Adaptive Business Applications
Published 2019-10-01“…The situation recognition capabilities and adaptive functionality of the system are demonstrated for web-applications for long-distance travel booking and a beauty products web-portal.…”
Get full text
Article -
145
Données ouvertes liées et recherche historique : un changement de paradigme
Published 2023-07-01“…We then present the infrastructure projects carried out at the Larhra (Laboratoire de recherche historique Rhône-Alpes) with the aim of facilitating the digital transition: symogih.org, ontome.net, geovistory.org. These Web applications are developed in line with the epistemology of the historical sciences and contribute to the realisation of a disciplinary “information graph”.…”
Get full text
Article -
146
A STUDY ON SECURITY FOR WEB-BASED APPLICATIONS
Published 2017-06-01“…Therefore, studying the risks for Web-based applications is the urgent need for organizations deploying web applications on the Internet. In this article, we will analyze the most common vulnerabilities of Web-based applications and recommend methods for detection.…”
Get full text
Article -
147
Fault-Tolerant Partition Resolvability of Cyclic Networks
Published 2021-01-01“…The interaction and interconnection between devices, sensors, and service providers have opened the door for an eruption of mobile over the web applications. Structure of web sites containing number of pages can be represented using graph, where web pages are considered to be the vertices, and an edge is a link between two pages. …”
Get full text
Article -
148
Detecting P2P botnet based on the role of flows
Published 2012-09-01“…Towards the weaknesses of the existing detection methods of P2P botnet,a novel real-time detection model based on the role of flows was proposed,which was named as RF.According to the characteristics of flows,the model made the flows play the different roles in the detection of the P2P botnet to detect the essential abnormality and the attacking abnormality.And the model considered the influence on the detection of the P2P botnet which the Web applications generated,especially the applications based on the P2P protocols.To minimize the false positive rate and false negative rate,a real-time method based on the sliding window to estimate the Hurst parameter was proposed,and the Kaufman algorithm was applied to adjust the threshold dynamically.The experiments showed that the model was able to detect the new P2P botnet with a relatively high precision.…”
Get full text
Article -
149
Forecasting Alisadr Cave Tourism Demand using Combination of Short-term and Long-term Forecasts
Published 2022-07-01“…The predictive models obtained from this study can enhance customer service and improve the interaction between users and tourist ticketing web applications and online reservation programs. …”
Get full text
Article -
150
Sistem Pendeteksi Banjir dan Badai Angin serta Monitoring Cuaca Berbasis Internet of Things
Published 2022-10-01“…The measurement results of the prototype tool produce a fairly good and accurate test consisting of testing the entire sensor, calibrating each sensor, and sending data to the server, as well as testing the software contained in every function of Android and web applications that can run optimally. …”
Get full text
Article -
151
Efficiency of Semantic Web Implementation on Cloud Computing: A Review
Published 2021-06-01“…In addition, a "cloud-driven" mode of interaction illustrates how we can construct the semantic web and provide automated semantical annotations to web applications on a large scale by leveraging Cloud computing properties and advantages. …”
Get full text
Article -
152
Penetration test method using blind SQL injection based on second-order fragment and reassembly
Published 2017-10-01“…How to get rid of the blindness of current SQL injection penetration test,produce the optimized attack pattern of SQL injection,enhance the effectiveness in the phase of attack generation,and improve the accuracy of vulnerability detection of SQL injection using penetration test,is a big challenge.In order to resolve these problems,a new penetration test method using blind SQL injection was proposed based on second-order fragment and reassembly.In this method,the SQL injection attack model was built firstly and then the multiform and multi-type attack patterns of SQL injection penetration test driven by the SQL injection attack model was produced,which can reduce the blindness of SQL injection penetration test and improve the accuracy of SQL injection vulnerability detection.The experiments of SQL injection vulnerability detection was conducted through the actual Web applications by using proposed method in comparison with current methods.The analysis results of test show the proposed method is better compared with other methods,which not only proves the effectiveness of proposed method,but also improve the accuracy of SQL injection vulnerability detection by reducing false negative in the defensive environment.…”
Get full text
Article -
153
Co-creating public value into digital-based public service innovation in the village governance
Published 2024-12-01“…The form of innovation in optimizing digital-based public services in Hamparan Perak Village is the application of web applications. This will strengthen the co-creation of public value derived from the level of community satisfaction through community trust and support for the implementation of web-based governance in Hamparan Perak Village.…”
Get full text
Article -
154
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
Published 2025-01-01“…This paper presents a novel neural network model for the detection of Structured Query Language (SQL) injection attacks for web applications. The model features high detection accuracy, fast inference speed, and low weight size. …”
Get full text
Article -
155
An Automatic Web Service Composition Framework Using QoS-Based Web Service Ranking Algorithm
Published 2015-01-01“…Web service has become the technology of choice for service oriented computing to meet the interoperability demands in web applications. In the Internet era, the exponential addition of web services nominates the “quality of service” as essential parameter in discriminating the web services. …”
Get full text
Article -
156
Research on the design and application of role-resource based access control model
Published 2024-11-01“…The traditional role-based access control (RBAC) model plays a crucial role in permission management but faces challenges in Web applications, such as lack of resource definition, permission explosion, and permission leakage. …”
Get full text
Article -
157
WEB VULNERABILITIES DETECTION USING A HYBRID MODEL OF CNN, GRU AND ATTENTION MECHANISM
Published 2025-01-01“…These results significantly outperform the state-of-the-art models and can strongly identify vulnerabilities in web applications. Through training, on both the SXCM1 and DPU-WVD datasets, the model achieved an accuracy rate of 99.99%. …”
Get full text
Article -
158
τJOWL: A Systematic Approach to Build and Evolve a Temporal OWL 2 Ontology Based on Temporal JSON Big Data
Published 2022-12-01“…Big data are being widely stored and exchanged in JavaScript Object Notation (JSON) format, in particular by Web applications. However, JSON data collections lack explicit semantics as they are in general schema-less, which does not allow to efficiently leverage the benefits of big data. …”
Get full text
Article -
159
A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks
Published 2015-01-01“…Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.…”
Get full text
Article -
160
Designing Development Readiness Indicators and Roadmap for Petaflops Scale Supercomputers
Published 2022-07-01“…Recently, supercomputers and high-performance computing (HPC) have caused significant progress in many fields, including industrial and research fields of artificial intelligence, data science, big data, Internet of Things, as well as large scale web applications. Regarding this characteristic, the supercomputer field becomes one of the strategic issues in developed and developing countries. …”
Get full text
Article