104   Artículos

« Anterior     Página: 1 de 6     Siguiente »

 
en línea
Calum C. Hall, Lynsay A. Shepherd and Natalie Coull    
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Anggi Elanda,Robby Lintang Buana     Pág. 185 - 191
Abstract -- OWASP (Open Web Application Security Project) version 4 issued by a non-profit organization called owasp.org which is dedicated to the security of web-based applications. This systematic review is intended to review whether the Open Web ... ver más

 
en línea
Keyong Wang, Mengyao Tong, Dequan Yang and Yuhang Liu    
IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet. While IPv6 has brought excellent convenience to the pu... ver más
Revista: Information    Formato: Electrónico

 
en línea
Luigi Lo Iacono, Hoai Viet Nguyen and Peter Leo Gorski    
Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept. In a SOA, applications are orchestrated by software services generally ope... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali and Noel Crespi    
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications. This mammoth rise in their usage has ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sibel Kapan and Efnan Sora Gunal    
In phishing attack detection, machine learning-based approaches are more effective than simple blacklisting strategies, as they can adapt to new types of attacks and do not require manual updates. However, for these approaches, the choice of features and... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zoltán Szabó and Vilmos Bilicki    
Due to the proliferation of large language models (LLMs) and their widespread use in applications such as ChatGPT, there has been a significant increase in interest in AI over the past year. Multiple researchers have raised the question: how will AI be a... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Harshvardhan J. Pandit    
Solid is a new radical paradigm based on decentralising control of data from central organisations to individuals that seeks to empower individuals to have active control of who and how their data is being used. In order to realise this vision, the use-c... ver más
Revista: Information    Formato: Electrónico

 
en línea
Fahad M. Alotaibi and Vassilios G. Vassilakis    
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Rokia Lamrani Alaoui and El Habib Nfaoui    
Web applications are the best Internet-based solution to provide online web services, but they also bring serious security challenges. Thus, enhancing web applications security against hacking attempts is of paramount importance. Traditional Web Applicat... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Muhammad Idris, Iwan Syarif, Idris Winarno     Pág. 246 - 261
The trend of API-based systems in web applications in the last few years keeps steadily growing. API allows web applications to interact with external systems to enable business-to-business or system-to-system integration which leads to multiple applicat... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Hayder Najm,Haider K. Hoomod,Rehab Hassan     Pág. pp. 184 - 199
The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems... ver más

 
en línea
Vlad Toma     Pág. 146 - 151
Revista: USV Annals of Economics and Public Administration    Formato: Electrónico

 
en línea
John Edison Moreno Marín, Paulo Cesar Coronado Sánchez    
ResumenDescargasReferenciasCómo citar
Revista: Ingeniería    Formato: Electrónico

 
en línea
Luca Roffia, Paolo Azzoni, Cristiano Aguzzi, Fabio Viola, Francesco Antoniazzi and Tullio Salmon Cinotti    
This paper presents a decentralized Web-based architecture designed to support the development of distributed, dynamic, context-aware and interoperable services and applications. The architecture enables the detection and notification of changes over the... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jose-Manuel Martinez-Caro, Antonio-Jose Aledo-Hernandez, Antonio Guillen-Perez, Ramon Sanchez-Iborra and Maria-Dolores Cano    
Web Content Management Systems (WCMS) play an increasingly important role in the Internet?s evolution. They are software platforms that facilitate the implementation of a web site or an e-commerce and are gaining popularity due to its flexibility and eas... ver más
Revista: Information    Formato: Electrónico

 
en línea
Luca Roffia, Paolo Azzoni, Cristiano Aguzzi, Fabio Viola, Francesco Antoniazzi and Tullio Salmon Cinotti    
This paper presents a decentralized Web-based architecture designed to support the development of distributed, dynamic, context-aware and interoperable services and applications. The architecture enables the detection and notification of changes over the... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Ramamurthi Deeptha,Rajeswari Mukesh     Pág. 8 - 14
Single sign-on (SSO) is an emerging and more secure authentication mechanism that enables an authorized user with a single username/password to be authenticated by many service providers in a distributed network system. The existing technique used SSO sc... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Aris Budiyarto,Abdur Rohman Harits Martawireja,Mohammad Harry Khomas Saputra,Gun Gun Maulana     Pág. 22 - 33
In Indonesia, the theft rate is still quite high. According to Bappeda data, cases of theft still tend to be high. In 2019, there were 362,000 cases of theft. CCTV use is still ineffective because at the time of the theft of goods, we only know the goods... ver más

 
en línea
Eduardo B. Fernandez, Ola Ajaj, Ingrid Buckley, Nelly Delessy-Gassant, Keiko Hashizume and Maria M. Larrondo-Petrie    
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 6     Siguiente »