|
|
|
Håkon Harnes and Donn Morrison
WebAssembly is a low-level bytecode language that enables high-level languages like C, C++, and Rust to be executed in the browser at near-native performance. In recent years, WebAssembly has gained widespread adoption and is now natively supported by al...
ver más
|
|
|
|
|
|
|
Alvina Ekua Ntefua Saah, Jurng-Jae Yee and Jae-Ho Choi
The construction industry, characterized by its intricate network of stakeholders and diverse workforce, grapples with the challenge of managing information effectively. This study delves into this issue, recognizing the universal importance of safeguard...
ver más
|
|
|
|
|
|
|
Xiaobo Tan, Yingjie Xu, Tong Wu and Bohan Li
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these me...
ver más
|
|
|
|
|
|
|
Rokia Lamrani Alaoui and El Habib Nfaoui
Web applications are the best Internet-based solution to provide online web services, but they also bring serious security challenges. Thus, enhancing web applications security against hacking attempts is of paramount importance. Traditional Web Applicat...
ver más
|
|
|
|
|
|
|
Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali and Noel Crespi
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications. This mammoth rise in their usage has ...
ver más
|
|
|
|
|
|
|
Abdul Majeed
Amid the ongoing COVID-19 pandemic, technical solutions (e.g., smartphone apps, web-based platforms, digital surveillance platforms, etc.) have played a vital role in constraining the spread of COVID-19. The major aspects in which technical solutions hav...
ver más
|
|
|
|
|
|
|
Enze Wang, Baosheng Wang, Wei Xie, Zhenhua Wang, Zhenhao Luo and Tai Yue
At present, embedded devices have become a part of people?s lives, so detecting security vulnerabilities contained in devices becomes imperative. There are three challenges in detecting embedded device vulnerabilities: (1) Most network protocols are stat...
ver más
|
|
|
|
|
|
|
Solomiia Fedushko, Taras Ustyianovych, Yuriy Syerov and Tomas Peracek
The Covid-19 crisis lockdown caused rapid transformation to remote working/learning modes and the need for e-commerce-, web-education-related projects development, and maintenance. However, an increase in internet traffic has a direct impact on infrastru...
ver más
|
|
|
|
|
|
|
Youn Kyu Lee and Dohoon Kim
Event-based system (EBS) is prevalent in various systems including mobile cyber physical systems (MCPSs), Internet of Things (IoT) applications, mobile applications, and web applications, because of its particular communication model that uses implicit i...
ver más
|
|
|
|
|
|
|
Artem S. Merkulov,Olga R. Laponina
Pág. 59 - 70
The object of the study is a web-based online payment company Payture, which cooperates with large companies and banks. Payture acts as a payment gateway between merchants, banks and payment systems, offering a flexible integration API. This paper analyz...
ver más
|
|
|
|