Academic literature on the topic 'Security of web applications'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security of web applications.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security of web applications"

1

Wu, Raymond, and Masayuki Hisada. "SOA Web Security and Applications." Journal of Object Technology 9, no. 2 (2010): 163. http://dx.doi.org/10.5381/jot.2010.9.2.a4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Erşahin, Buket, and Mustafa Erşahin. "Web application security." South Florida Journal of Development 3, no. 4 (2022): 4194–203. http://dx.doi.org/10.46932/sfjdv3n4-002.

Full text
Abstract:
This study aims to show how security flaws of web applications can threat information security. Web Application Security is a branch of Information Security which focuses on web application level security flaws and their solutions. Evolution of Web continues with a big momentum. Amount of information shared over Web increases every day, various business domains continue to integrate their operations to digital world. This brings its own risks and makes Information Security of Web Applications more important than ever. Most common and serious Web vulnerabilities have been analyzed along with th
APA, Harvard, Vancouver, ISO, and other styles
3

Jalgasbaevna, PerdebaevaInabat. "Identifying andMitigating Security Vulnerabilities inWeb Applications." American Journal of Applied Science and Technology 5, no. 5 (2025): 10–11. https://doi.org/10.37547/ajast/volume05issue05-03.

Full text
Abstract:
As web applications continue to play a critical role in modern digital infrastructure, their security has become a major concern. This article explores the most common types of security vulnerabilities in web applications, including SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), and broken authentication. It further outlines various techniques for identifying and mitigating these vulnerabilities, such as input validation, secure coding practices, use of security headers, and implementation of secure authentication mechanisms. The paper also emphasizes the importa
APA, Harvard, Vancouver, ISO, and other styles
4

Pankaj, Choudhary, Aaseri Rajendra, and Roberts Nirmal. "HTTPI BASED WEB SERVICE SECURITY OVER SOAP." International Journal of Network Security & Its Applications (IJNSA) 5, no. 3 (2013): 55–66. https://doi.org/10.5281/zenodo.4278394.

Full text
Abstract:
Now a days, a new family of web applications 'open applications’, are emerging (e.g., Social Networking, News and Blogging). Generally, these open applications are non-confidential. The security needs of these applications are only client/server authentication and data integrity. For securing these open applications, effectively and efficiently, HTTPI, a new transport protocol is proposed, which ensures the entire security requirements of open applications. Benefit of using the HTTPI is that it is economical in use, well-suited for cache proxies, like HTTP is, and provides security a
APA, Harvard, Vancouver, ISO, and other styles
5

Sidoon, Diaddeen, Anwar Alhenshiri, and Inass Husien. ", WASec, a Web security scanner for Web Application." مجلة العلوم الاساسية و التطبيقية, no. 10 (June 23, 2025): 48–56. https://doi.org/10.36602/jsba.2020.10.48.

Full text
Abstract:
Web application security scanners are automated testing and scanning programs that examine web applications for potential security vulnerabilities. WASec (Web Application Security) was created as a security scanner that uses black-boxtesting to scan web applications for error-based and time-based SQL injection along with Reflected Cross-site Scripting vulnerabilities and report them. WAsec was tested against web applications of known vulnerabilities. The testing process, althoughpreliminary, has showed promising results. The design and implementation of this tool was intended to tackle the cur
APA, Harvard, Vancouver, ISO, and other styles
6

Shah, Sarthak. "Fortifying Data Security." International Journal of Applied and Advanced Multidisciplinary Research 1, no. 3 (2023): 221–28. http://dx.doi.org/10.59890/ijaamr.v1i3.679.

Full text
Abstract:
This paper delves into the crucial aspects of authentication and authorization in modern web applications with a focus on enhancing data security. It explores the use of Node.js, a versatile server-side language, for building web applications and discusses the significance of a secure website for establishing trust between clients and servers. The research covers the implementation of authentication using packages and hashing algorithms, emphasizing the importance of "salt" and "pepper" for password security. Authorization methods, including cookies, sessions, and middleware, are also explored
APA, Harvard, Vancouver, ISO, and other styles
7

Alrawais, Layla Mohammed, Mamdouh Alenezi, and Mohammad Akour. "Security Testing Framework for Web Applications." International Journal of Software Innovation 6, no. 3 (2018): 93–117. http://dx.doi.org/10.4018/ijsi.2018070107.

Full text
Abstract:
The growth of web-based applications has increased tremendously from last two decades. While these applications bring huge benefits to society, yet they suffer from various security threats. Although there exist various techniques to ensure the security of web applications, still a large number of applications suffer from a wide variety of attacks and result in financial loses. In this article, a security-testing framework for web applications is proposed with an argument that security of an application should be tested at every stage of software development life cycle (SDLC). Security testing
APA, Harvard, Vancouver, ISO, and other styles
8

Alzahrani, Abdulrahman, Ali Alqazzaz, Nabil Almashfi, Huirong Fu, and Ye Zhu. "Web Application Security Tools Analysis." Studies in Media and Communication 5, no. 2 (2017): 118. http://dx.doi.org/10.11114/smc.v5i2.2663.

Full text
Abstract:
Strong security in web applications is critical to the success of your online presence. Security importance has grown massively, especially among web applications. Dealing with web application or website security issues requires deep insight and planning, not only because of the many tools that are available but also because of the industry immaturity. Thus, finding the proper tools requires deep understanding and several steps, including analyzing the development environment, business needs, and the web applications’ complexity. In this paper, we demonstrate the architecture of web applicatio
APA, Harvard, Vancouver, ISO, and other styles
9

Morgan, David. "Network security and custom Web applications." Network Security 2004, no. 4 (2004): 15–17. http://dx.doi.org/10.1016/s1353-4858(04)00068-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Joshi, James B. D., Walid G. Aref, Arif Ghafoor, and Eugene H. Spafford. "Security models for web-based applications." Communications of the ACM 44, no. 2 (2001): 38–44. http://dx.doi.org/10.1145/359205.359224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security of web applications"

1

Prabhakara, Deepak. "Web Applications Security : A security model for client-side web applications." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8962.

Full text
Abstract:
<p>The Web has evolved to support sophisticated web applications. These web applications are exposed to a number of attacks and vulnerabilities. The existing security model is unable to cope with these increasing attacks and there is a need for a new security model that not only provides the required security but also supports recent advances like AJAX and mashups. The attacks on client-side Web Applications can be attributed to four main reasons – 1) lack of a security context for Web Browsers to take decisions on the legitimacy of requests, 2) inadequate JavaScript security, 3) lack of a Ne
APA, Harvard, Vancouver, ISO, and other styles
2

Svartberg, Anja. "Security in Offline Web Applications." Thesis, Norges Teknisk-Naturvitenskaplige Universitet, Institutt for elektronikk og telekommunikasjon, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10003.

Full text
Abstract:
<p>Offline Web applications are increasingly popular. The possibility to have both the advantages of Web applications and traditional desktop applications is exiting. An offline Web application can be accessed from all computers, with any operating system, as well as offering to store information locally, giving the user the opportunity to use the application when the user does not have Internet access. The concept of offline Web applications is tempting, but it is important to integrate security in the process of making them. The users rely on a high level of security. In this thesis I have l
APA, Harvard, Vancouver, ISO, and other styles
3

Ge, Xiaocheng. "Agile security for Web applications." Thesis, University of York, 2007. http://etheses.whiterose.ac.uk/11071/.

Full text
Abstract:
Web-based applications (or more concisely, Web applications) are a kind of information system with a particular architecture. They have progressively evolved from Internet browser-based, read-only information repositories to Web-based distributed systems. Today, increasing numbers of businesses rely on their Web applications. At the same time, Web applications are facing many security challenges and, as a result, are exposing businesses to many risks. This thesis proposes a novel approach to building secure Web applications using agile software development methods.
APA, Harvard, Vancouver, ISO, and other styles
4

Ur-Rehman, Wasi. "Maintaining Web Applications Integrity Running on RADIUM." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804975/.

Full text
Abstract:
Computer security attacks take place due to the presence of vulnerabilities and bugs in software applications. Bugs and vulnerabilities are the result of weak software architecture and lack of standard software development practices. Despite the fact that software companies are investing millions of dollars in the research and development of software designs security risks are still at large. In some cases software applications are found to carry vulnerabilities for many years before being identified. A recent such example is the popular Heart Bleed Bug in the Open SSL/TSL. In today’s world,
APA, Harvard, Vancouver, ISO, and other styles
5

Erdogan, Gencer. "Security Testing of Web Based Applications." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9993.

Full text
Abstract:
<p>Web applications are becoming more and more popular in means of modern information interaction, which leads to a growth of the demand of Web applications. At the same time, Web application vulnerabilities are drastically increasing. This will inevitably expose more Web application users to malicious attacks, causing them to lose valuable information or be harmed in other ways. One of the most important software security practices that is used to mitigate the increasing number of vulnerabilities is security testing. The most commonly applied security testing methodologies today are extensi
APA, Harvard, Vancouver, ISO, and other styles
6

Charpentier, Rojas Jose Enrique. "Web application Security." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21624.

Full text
Abstract:
Problems related to web application security comes in many ways, one example is inexperience programmers but not only in the way they code and program but also which language and structure they use to code. Not only programmers but Software companies left holes in the software they developed of course without intention.Because is proven that most of the vulnerabilities start in the web application side, as developers we need to follow certain principles, test our code and learn as much as possible about the subject, as a foundation of web application security in order to know how to prevent is
APA, Harvard, Vancouver, ISO, and other styles
7

Srilatha, Rondla, and Gande Someshwar. "Security Testing for Web Applications in SDLC." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2903.

Full text
Abstract:
Context: In Web applications, the Software vulnerability can be reduced by applying security testing in all phases of the software development life cycle (SDLC). Lot of vulnerabilities might occur if the security testing is applied in the last phase of SDLC. In order to mitigate these vulnerabilities, a lot of rework is required that involves reverse engineering in the development and design phases. To overcome this situation, organizations are shifting from security testing (performed in last phase) towards security testing in the early phases of SDLC. Objectives: The main objectives of this
APA, Harvard, Vancouver, ISO, and other styles
8

Avancini, Andrea. "Security Testing of Web and Smartphone Applications." Doctoral thesis, Università degli studi di Trento, 2013. https://hdl.handle.net/11572/368950.

Full text
Abstract:
Web applications have become integral part of everyday life, as they are used by a huge number of customers on regular basis, for daily operations in business, leisure, government or academia, and so correctness of these applications is fundamental. In particular, security is a crucial concern especially for these applications that are constantly exposed to potentially malicious environments. Cross-site scripting (XSS for short) is considered one of the major threats to the security of web applications. Missing input validation can be exploited by attackers to inject malicious code into the a
APA, Harvard, Vancouver, ISO, and other styles
9

Avancini, Andrea. "Security Testing of Web and Smartphone Applications." Doctoral thesis, University of Trento, 2013. http://eprints-phd.biblio.unitn.it/1123/1/andrea-avancini-phd-thesis-last.pdf.

Full text
Abstract:
Web applications have become integral part of everyday life, as they are used by a huge number of customers on regular basis, for daily operations in business, leisure, government or academia, and so correctness of these applications is fundamental. In particular, security is a crucial concern especially for these applications that are constantly exposed to potentially malicious environments. Cross-site scripting (XSS for short) is considered one of the major threats to the security of web applications. Missing input validation can be exploited by attackers to inject malicious code into the
APA, Harvard, Vancouver, ISO, and other styles
10

Foss, Julie-Marie, and Nina Ingvaldsen. "Web Application Security." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9235.

Full text
Abstract:
<p>As more and more sensitive information is entering web based applications, and thus are available through a web browser, securing these systems is of increasing importance. A software system accessible through the web is continuously exposed to threats, and is accessible to anyone who would like to attempt a break-in. These systems can not rely on only external measures like separate network zones and firewalls for security. Symantecs1 Internet Security Threat Report [34] is published every six months. Main findings in the last one published prove that there is an increase in threats to c
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security of web applications"

1

Vincent, Liu, and Sima Caleb, eds. Hacking exposed: Web applications : web application security secrets and solutions. 3rd ed. McGraw-Hill, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Splaine, Steve. Testing web security: Assessing the security of web sites and applications. Wiley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Scambray, Joel. Hacking exposed: Web applications. McGraw-Hill/Osborne, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Serrão, Carlos, Vicente Aguilera Díaz, and Fabio Cerullo, eds. Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mike, Shema, ed. Hacking exposed: Web applications. McGraw-Hill/Osborne, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Inc, ebrary, ed. GlassFish security: Secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures. Packt Open Source, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Andreu, Andres. Professional pen testing for Web applications. Wiley Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bill, Ballad, ed. Securing PHP web applications. Addison-Wesley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bill, Ballad, ed. Securing PHP web applications. Addison-Wesley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1980-, Clark Chris, and Thiel David V, eds. Mobile application security: Protect mobile applications and devices from Web 2.0 attacks. McGraw-Hill, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security of web applications"

1

Cerullo, Fabio E. "Deploying Secure Web Applications with OWASP Resources." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Teodoro, Nuno, and Carlos Serrão. "Web Applications Security Assessment in the Portuguese World Wide Web Panorama." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Siles, Raul. "Assessing and Exploiting Web Applications with the Open-Source Samurai Web Testing Framework." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fernández-Sanguino, Javier. "Protection of Applications at the Enterprise in the Real World: From Audits to Controls." In Web Application Security. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sahu, Satej Kumar. "Web Security for PHP Applications." In Building Secure PHP Applications. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0932-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Basin, David, Patrick Schaller, and Michael Schläpfer. "Web Application Security." In Applied Information Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Harris, Steve, and Rob Macdonald. "Web Application Security." In Moving to ASP.NET: Web Development with VB .NET. Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-1097-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Ho Jung, and Jung Hwan Song. "Designing Security Auditing Protocol with Web Browsers." In Information Security Applications. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11604938_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Varadharajan, Vijay. "Security and Trust in the Web." In Web Technologies and Applications. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29253-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Choi, Dae-Sik, Eul Gyu Im, and Cheol-Won Lee. "Intrusion-Tolerant System Design for Web Server Survivability." In Information Security Applications. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24591-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security of web applications"

1

Diyora, Vishal, and Nilesh Savani. "Blockchain or AI: Web Applications Security Mitigations." In 2024 First International Conference on Pioneering Developments in Computer Science & Digital Technologies (IC2SDT). IEEE, 2024. http://dx.doi.org/10.1109/ic2sdt62152.2024.10696861.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dafalla, Yousif, Dalton A. Brucker-Hahn, Drew Davidson, and Alexandru G. Bardas. "Web-Armour: Mitigating Reconnaissance and Vulnerability Scanning with Scan-Impeding Delays in Web Deployments." In 2024 Annual Computer Security Applications Conference (ACSAC). IEEE, 2024. https://doi.org/10.1109/acsac63791.2024.00028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mycek, Andrzej, and Maryna Lukaczyk. "Multi-Layered Security Of Web Applications In Cloud Environments Using WAF, Zero Trust, AI-Driven Threat Detection, And RASP." In 39th ECMS International Conference on Modelling and Simulation. ECMS, 2025. https://doi.org/10.7148/2025-0262.

Full text
Abstract:
Contemporary web applications, despite their increasing functional sophistication, remain highly vulnerable to numerous security threats. Undoubtedly, the most prevalent threats to web applications include SQL Injection (SQLi), Cross-Site Scripting (XSS), and Remote Code Execution (RCE). Traditional approaches to securing applications and their environments have proven insufficient in mitigating these risks effectively. The objective of this publication is to implement a multi-layered security model in the cloud, leveraging a Web Application Firewall (WAF), the Zero Trust concept, Artificial I
APA, Harvard, Vancouver, ISO, and other styles
4

Teodoro, Nuno, and Carlos Serrao. "Web application security: Improving critical web-based applications quality through in-depth security analysis." In 2011 International Conference on Information Society (i-Society). IEEE, 2011. http://dx.doi.org/10.1109/i-society18435.2011.5978496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kushe, Renelada. "Security Assessment of Web Applications." In University for Business and Technology International Conference. University for Business and Technology, 2017. http://dx.doi.org/10.33107/ubt-ic.2017.189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Muyang, Ke Li, and Tao Chen. "Security testing of web applications." In GECCO '19: Genetic and Evolutionary Computation Conference. ACM, 2019. http://dx.doi.org/10.1145/3319619.3322026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tanaskovic, Tamara M., and Miodrag Z. Zivkovic. "Security principles for web applications." In 2011 19th Telecommunications Forum Telfor (TELFOR). IEEE, 2011. http://dx.doi.org/10.1109/telfor.2011.6143843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Winslett, Marinne. "Session details: Web applications security." In CCS07: 14th ACM Conference on Computer and Communications Security 2007. ACM, 2007. http://dx.doi.org/10.1145/3245855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Oh, ChangSeok, Sangho Lee, Chenxiong Qian, Hyungjoon Koo, and Wenke Lee. "DeView: Confining Progressive Web Applications by Debloating Web APIs." In ACSAC: Annual Computer Security Applications Conference. ACM, 2022. http://dx.doi.org/10.1145/3564625.3567987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Teodoro, Nuno, and Carlos Serrao. "Assessing the Portuguese Web applications security." In 2011 World Congress on Internet Security (WorldCIS-2011). IEEE, 2011. http://dx.doi.org/10.1109/worldcis17046.2011.5749875.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security of web applications"

1

Agarwal, Smisha, Madhu Jalan, Holly C. Wilcox, et al. Evaluation of Mental Health Mobile Applications. Agency for Healthcare Research and Quality (AHRQ), 2022. http://dx.doi.org/10.23970/ahrqepctb41.

Full text
Abstract:
Background. Mental health mobile applications (apps) have the potential to expand the provision of mental health and wellness services to traditionally underserved populations. There is a lack of guidance on how to choose wisely from the thousands of mental health apps without clear evidence of safety, efficacy, and consumer protections. Purpose. This Technical Brief proposes a framework to assess mental health mobile applications with the aim to facilitate selection of apps. The results of applying the framework will yield summary statements on the strengths and limitations of the apps and ar
APA, Harvard, Vancouver, ISO, and other styles
2

Bossert, G., S. Cooper, and W. Drummond. Considerations for Web Transaction Security. RFC Editor, 1997. http://dx.doi.org/10.17487/rfc2084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aldrich, Susan. Web Services Security Issues and Antidotes. Patricia Seybold Group, 2003. http://dx.doi.org/10.1571/ii2-27-03cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Scholl, Lynn, Daniel Oviedo, and Orlando Sabogal-Cardona. Disrupting Personal (In)Security? The Role of Ride-Hailing Service Features, Commute Strategies, and Gender in Mexico City. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003812.

Full text
Abstract:
This paper sheds light on the personal security dimension of ride-hailing from a gender perspective. We explore how features of Transportation Network Companies (TNCs) services affect riders perceptions of security when commuting in ride-hailing services, and how general perceptions of fear of crime shape the way people value such features. Moreover, we analyze the strategies women and men are using to enhance their own security in ride-hailing and factors influencing these strategies. We conducted a survey of users of the TNC DiDi in Mexico City. The statistical methods used are structural eq
APA, Harvard, Vancouver, ISO, and other styles
5

Venkatram, Nischay. Benchmarking AssemblyScript for Faster Web Applications. Iowa State University, 2020. http://dx.doi.org/10.31274/cc-20240624-288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

de Jesus, Ana, and Sara Melander. From Vision to Practice – Insights from Nordic-Baltic 5G applications across sectors. Nordregio, 2024. http://dx.doi.org/10.6027/r2024:111403-2503.

Full text
Abstract:
This report builds on the findings of the Nordic-Baltic 5G Monitoring Tool (N-B 5G MT) project ‘Analytical Report’, which focused on mapping 5G activities in the Nordic-Baltic region and analysing their roll-out status. In this follow-up report, we delve deeper into actual 5G applications across different verticals (i.e. sectors), including healthcare, transportation/mobility, industry and media/broadcasting. The report identifies challenges in each sector, such as funding constraints in healthcare, technical hurdles in transportation, market immaturity in industry, and infrastructure investme
APA, Harvard, Vancouver, ISO, and other styles
7

Nguyen-Tuong, Anh, Salvatore Guarnieri, Doug Greene, and David Evans. Automatically Hardening Web Applications Using Precise Tainting. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada436667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Baratloo, A., M. Karaul, H. Karl, and Z. M. Kedem. KnittingFactory: An Infrastructure for Distributed Web Applications. Defense Technical Information Center, 1997. http://dx.doi.org/10.21236/ada439808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gruninger, Michael. Applications of PSL to semantic web services. National Institute of Standards and Technology, 2004. http://dx.doi.org/10.6028/nist.ir.7165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pritychenko, B., and A. A. Sonzogni. SIGMA WEB INTERFACE FOR REACTOR DATA APPLICATIONS. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/970612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!