期刊文献+
共找到390,533篇文章
< 1 2 250 >
每页显示 20 50 100
Secure Development Methodology for Full Stack Web Applications:Proof of the Methodology Applied to Vue.js,Spring Boot and MySQL
1
作者 Kevin Santiago Rey Rodriguez Julián David Avellaneda Galindo +3 位作者 Josep Tárrega Juan Juan Ramón Bermejo Higuera Javier Bermejo Higuera Juan Antonio Sicilia Montalvo 《Computers, Materials & Continua》 2025年第10期1807-1858,共52页
In today’s rapidly evolving digital landscape,web application security has become paramount as organizations face increasingly sophisticated cyber threats.This work presents a comprehensive methodology for implementi... In today’s rapidly evolving digital landscape,web application security has become paramount as organizations face increasingly sophisticated cyber threats.This work presents a comprehensive methodology for implementing robust security measures in modern web applications and the proof of the Methodology applied to Vue.js,Spring Boot,and MySQL architecture.The proposed approach addresses critical security challenges through a multi-layered framework that encompasses essential security dimensions including multi-factor authentication,fine-grained authorization controls,sophisticated session management,data confidentiality and integrity protection,secure logging mechanisms,comprehensive error handling,high availability strategies,advanced input validation,and security headers implementation.Significant contributions are made to the field of web application security.First,a detailed catalogue of security requirements specifically tailored to protect web applications against contemporary threats,backed by rigorous analysis and industry best practices.Second,the methodology is validated through a carefully designed proof-of-concept implementation in a controlled environment,demonstrating the practical effectiveness of the security measures.The validation process employs cutting-edge static and dynamic analysis tools for comprehensive dependency validation and vulnerability detection,ensuring robust security coverage.The validation results confirm the prevention and avoidance of security vulnerabilities of the methodology.A key innovation of this work is the seamless integration of DevSecOps practices throughout the secure Software Development Life Cycle(SSDLC),creating a security-first mindset from initial design to deployment.By combining proactive secure coding practices with defensive security approaches,a framework is established that not only strengthens application security but also fosters a culture of security awareness within development teams.This hybrid approach ensures that security considerations are woven into every aspect of the development process,rather than being treated as an afterthought. 展开更多
关键词 web security methodology secure software development lifecycle DevSecOps security requirements secure development Full Stack web applications
在线阅读 下载PDF
Dynamic effect web generation for heterogeneous UAV cluster using DQN-based NSGA-Ⅱ:Methods and applications 被引量:1
2
作者 Pei CHI Chen LIU +2 位作者 Jiang ZHAO Kun WU Yingxun WANG 《Chinese Journal of Aeronautics》 2025年第7期374-388,共15页
Effect web will be an important combat means to achieve accurate,efficient,agile and reliable destruction of enemy targets.The use of Unmanned Aerial Vehicles(UAV)cluster in warfare has become a key element in the bat... Effect web will be an important combat means to achieve accurate,efficient,agile and reliable destruction of enemy targets.The use of Unmanned Aerial Vehicles(UAV)cluster in warfare has become a key element in the battle for military superiority between nations.The construction of UAV cluster effect web is a kind of combinatorial optimization in essence.By selecting the optimal combination in the limited equipment concentration,the whole network can be optimized.Firstly,in order to improve the combinatorial optimization efficiency of UAV cluster effect web,NSGA-Ⅱbased on deep Q-network(DQN-based NSGA-Ⅱ)is proposed.This algorithm is used to solve the Multi-Objective Combinatorial Optimization(MOCO)problem in the construction of effect web.Secondly,a dynamic generation method is devised to solve the problem caused by the possible destruction of enemy and our node under the fierce confrontation between the two sides.Finally,the simulation results show that the DQN-based NSGA-Ⅱis better than the genetic algorithm with single operator.The comparison experiment shows that the weight of evaluation indexes will have a corresponding influence on the optimization results. 展开更多
关键词 Optimization Effect web Unmanned Aerial Vehicles(UAV) Deep learning Genetic algorithm
原文传递
Access to emergency medical services in Beijing:integrating web mapping application programming interfaces and empirical Bayesian Kriging interpolation analysis
3
作者 Haolin Zhu Mo Xu +2 位作者 Luying Zhu Sijia Tian Jinjun Zhang 《World Journal of Emergency Medicine》 2025年第3期266-268,共3页
Emergency medical services (EMS) are a vital element of the public healthcare system in China,^([1])providing an opportunity to respond to critical medical conditions and save people’s lives.^([2])The accessibility o... Emergency medical services (EMS) are a vital element of the public healthcare system in China,^([1])providing an opportunity to respond to critical medical conditions and save people’s lives.^([2])The accessibility of EMS has received considerable attention in health and transport geography studies.^([3])One of the optimal gauges for evaluating the accessibility of EMS is the response time,which is defined as the time from receiving an emergency call to the arrival of an ambulance.^([4])Beijing has already reduced the response time to approximately12 min,and the next goal is to ensure that the response time across Beijing does not exceed 12 min (the information comes from the Beijing Emergency Medical Center). 展开更多
关键词 emergency medical services public healthcare system web mapping application programming interfaces empirical bayesian kriging interpolation analysis ACCESSIBILITY respond critical medical conditions response time
暂未订购
Kinetic investigation of the energy storage process in graphene fiber supercapacitors:Unraveling mechanisms,fabrications,property manipulation,and wearable applications
4
作者 Juan Zhang Wenwen Liu +8 位作者 Minzhi Du Qingli Xu Minren Hung Ruifang Xiang Meng Liao Xinhou Wang Bingjie Wang Aiping Yu Kun Zhang 《Carbon Energy》 2025年第1期133-173,共41页
Graphene fiber supercapacitors(GFSCs)have garnered significant attention due to their exceptional features,including high power density,rapid charge/discharge rates,prolonged cycling durability,and versatile weaving c... Graphene fiber supercapacitors(GFSCs)have garnered significant attention due to their exceptional features,including high power density,rapid charge/discharge rates,prolonged cycling durability,and versatile weaving capabilities.Nevertheless,inherent challenges in graphene fibers(GFs),particularly the restricted ion-accessible specific surface area(SSA)and sluggish ion transport kinetics,hinder the achievement of optimal capacitance and rate performance.Despite existing reviews on GFSCs,a notable gap exists in thoroughly exploring the kinetics governing the energy storage process in GFSCs.This review aims to address this gap by thoroughly analyzing the energy storage mechanism,fabrication methodologies,property manipulation,and wearable applications of GFSCs.Through theoretical analysis of the energy storage process,specific parameters in advanced GF fabrication methodologies are carefully summarized,which can be used to modulate nano/micro-structures,thereby enhancing energy storage kinetics.In particular,enhanced ion storage is realized by creating more ion-accessible SSA and introducing extra-capacitive components,while accelerated ion transport is achieved by shortening the transport channel length and improving the accessibility of electrolyte ions.Building on the established structure-property relationship,several critical strategies for constructing optimal surface and structure profiles of GF electrodes are summarized.Capitalizing on the exceptional flexibility and wearability of GFSCs,the review further underscores their potential as foundational elements for constructing multifunctional e-textiles using conventional textile technologies.In conclusion,this review provides insights into current challenges and suggests potential research directions for GFSCs. 展开更多
关键词 fiber-shaped supercapacitor GRAPHENE ion storage ion transport wearable application
在线阅读 下载PDF
A Detailed Review of Current AI Solutions for Enhancing Security in Internet of Things Applications
5
作者 Arshiya Sajid Ansari Ghadir Altuwaijri +3 位作者 Fahad Alodhyani Moulay Ibrahim El-Khalil Ghembaza Shahabas Manakunnath Devasam Paramb Mohammad Sajid Mohammadi 《Computers, Materials & Continua》 2025年第6期3713-3752,共40页
IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrai... IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse applications.Due to their heterogeneous nature and constrained resources,as well as the growing trend of using smart gadgets,there are privacy and security issues that are not adequately managed by conventional securitymeasures.This review offers a thorough analysis of contemporary AI solutions designed to enhance security within IoT ecosystems.The intersection of AI technologies,including ML,and blockchain,with IoT privacy and security is systematically examined,focusing on their efficacy in addressing core security issues.The methodology involves a detailed exploration of existing literature and research on AI-driven privacy-preserving security mechanisms in IoT.The reviewed solutions are categorized based on their ability to tackle specific security challenges.The review highlights key advancements,evaluates their practical applications,and identifies prevailing research gaps and challenges.The findings indicate that AI solutions,particularly those leveraging ML and blockchain,offerpromising enhancements to IoT privacy and security by improving threat detection capabilities and ensuring data integrity.This paper highlights how AI technologies might strengthen IoT privacy and security and offer suggestions for upcoming studies intended to address enduring problems and improve the robustness of IoT networks. 展开更多
关键词 Security in IoT applications PRIVACY-PRESERVING blockchain AI-driven security mechanisms
在线阅读 下载PDF
Application Research of Wireless Sensor Networks and the Internet of Things
6
作者 Changjian Lv Rui Wang Man Zhao 《Journal of Electronic Research and Application》 2025年第4期283-289,共7页
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee... In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers. 展开更多
关键词 Wireless Sensor networks Internet of Things Key technologies application fields
在线阅读 下载PDF
A Novel Malware Detection Framework for Internet of Things Applications
7
作者 Muhammad Adil Mona M.Jamjoom Zahid Ullah 《Computers, Materials & Continua》 2025年第9期4363-4380,共18页
In today’s digital world,the Internet of Things(IoT)plays an important role in both local and global economies due to its widespread adoption in different applications.This technology has the potential to offer sever... In today’s digital world,the Internet of Things(IoT)plays an important role in both local and global economies due to its widespread adoption in different applications.This technology has the potential to offer several advantages over conventional technologies in the near future.However,the potential growth of this technology also attracts attention from hackers,which introduces new challenges for the research community that range from hardware and software security to user privacy and authentication.Therefore,we focus on a particular security concern that is associated with malware detection.The literature presents many countermeasures,but inconsistent results on identical datasets and algorithms raise concerns about model biases,training quality,and complexity.This highlights the need for an adaptive,real-time learning framework that can effectively mitigate malware threats in IoT applications.To address these challenges,(i)we propose an intelligent framework based on Two-step Deep Reinforcement Learning(TwStDRL)that is capable of learning and adapting in real-time to counter malware threats in IoT applications.This framework uses exploration and exploitation phenomena during both the training and testing phases by storing results in a replay memory.The stored knowledge allows the model to effectively navigate the environment and maximize cumulative rewards.(ii)To demonstrate the superiority of the TwStDRL framework,we implement and evaluate several machine learning algorithms for comparative analysis that include Support Vector Machines(SVM),Multi-Layer Perceptron,Random Forests,and k-means Clustering.The selection of these algorithms is driven by the inconsistent results reported in the literature,which create doubt about their robustness and reliability in real-world IoT deployments.(iii)Finally,we provide a comprehensive evaluation to justify why the TwStDRL framework outperforms them in mitigating security threats.During analysis,we noted that our proposed TwStDRL scheme achieves an average performance of 99.45%across accuracy,precision,recall,and F1-score,which is an absolute improvement of roughly 3%over the existing malware-detection models. 展开更多
关键词 IoT applications security malware detection advanced machine learning algorithms data privacy challenges
在线阅读 下载PDF
Blockchain-Enabled Data Secure Sharing with Privacy Protection Based on Proxy Re-Encryption in Web3.0 Applications
8
作者 Ma Jiawei Zhou Haojie +2 位作者 Wang Sidie Song Jiyuan Tian Tian 《China Communications》 2025年第5期256-272,共17页
With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the... With the rapid development of web3.0 applications,the volume of data sharing is increasing,the inefficiency of big data file sharing and the problem of data privacy leakage are becoming more and more prominent,and the existing data sharing schemes have been difficult to meet the growing demand for data sharing,this paper aims at exploring a secure,efficient and privacy-protecting data sharing scheme under web3.0 applications.Specifically,this paper adopts interplanetary file system(IPFS)technology to realize the storage of large data files to solve the problem of blockchain storage capacity limitation,and utilizes ciphertext policy attribute-based encryption(CP-ABE)and proxy re-encryption(PRE)technology to realize secure multi-party sharing and finegrained access control of data.This paper provides the detailed algorithm design and implementation of data sharing phases and processes,and analyzes the algorithms from the perspectives of security,privacy protection,and performance. 展开更多
关键词 blockchain data sharing privacy protection proxy re-encryption web3.0
在线阅读 下载PDF
Web Visualization Application of Large Mesh Models Based on Simplification Algorithms
9
作者 Shengtai Shi 《Journal of Electronic Research and Application》 2025年第2期197-203,共7页
This paper studies polygon simplification algorithms for 3D models,focuses on the optimization algorithm of quadratic error metric(QEM),explores the impacts of different methods on the simplification of different mode... This paper studies polygon simplification algorithms for 3D models,focuses on the optimization algorithm of quadratic error metric(QEM),explores the impacts of different methods on the simplification of different models,and develops a web-based visualization application.Metrics such as the Hausdorff distance are used to evaluate the balance between the degree of simplification and the retention of model details. 展开更多
关键词 QEM algorithm Mesh simplification webGL rendering Java web development
在线阅读 下载PDF
Honeycomb-spiderweb-inspired self-similar hybrid cellular structures for impact applications
10
作者 K.Tewari M.K.Pandit +1 位作者 M.M.Mahapatra P.R.Budarapu 《Defence Technology(防务技术)》 2025年第1期182-200,共19页
Inspired by nature's self-similar designs,novel honeycomb-spiderweb based self-similar hybrid cellular structures are proposed here for efficient energy absorption in impact applications.The energy absorption is e... Inspired by nature's self-similar designs,novel honeycomb-spiderweb based self-similar hybrid cellular structures are proposed here for efficient energy absorption in impact applications.The energy absorption is enhanced by optimizing the geometry and topology for a given mass.The proposed hybrid cellular structure is arrived after a thorough analysis of topologically enhanced self-similar structures.The optimized cell designs are rigorously tested considering dynamic loads involving crush and high-velocity bullet impact.Furthermore,the influence of thickness,radial connectivity,and order of patterning at the unit cell level are also investigated.The maximum crushing efficiency attained is found to be more than 95%,which is significantly higher than most existing traditional designs.Later on,the first and second-order hierarchical self-similar unit cell designs developed during crush analysis are used to prepare the cores for sandwich structures.Impact tests are performed on the developed sandwich structures using the standard 9-mm parabellum.The influence of multistaging on impact resistance is also investigated by maintaining a constant total thickness and mass of the sandwich structure.Moreover,in order to avoid layer-wise weak zones and hence,attain a uniform out-of-plane impact strength,off-setting the designs in each stage is proposed.The sandwich structures with first and second-order self-similar hybrid cores are observed to withstand impact velocities as high as 170 m/s and 270 m/s,respectively. 展开更多
关键词 Sandwich structures Honeycomb-spider web inspired Self-similar hierarchy Crush analysis High-velocity impact Strong and weak zones Multistaging
在线阅读 下载PDF
Using X Social Networks and web news mining to predict Marburg virus disease outbreaks
11
作者 Mohammad Jokar Kia Jahanbin Vahid Rahmanian 《Asian Pacific Journal of Tropical Medicine》 2025年第2期96-98,共3页
Marburg virus disease(MVD)is a highly fatal illness,with a case fatality rate of up to 88%,though this rate can be significantly reduced with prompt and effective patient care.The disease was first identified in 1967 ... Marburg virus disease(MVD)is a highly fatal illness,with a case fatality rate of up to 88%,though this rate can be significantly reduced with prompt and effective patient care.The disease was first identified in 1967 during concurrent outbreaks in Marburg and Frankfurt,Germany,and in Belgrade,Serbia,linked to laboratory use of African green monkeys imported from Uganda.Subsequent outbreaks and isolated cases have been reported in various African countries,including Angola,the Democratic Republic of the Congo,Equatorial Guinea,Ghana,Guinea,Kenya,Rwanda,South Africa(in an individual with recent travel to Zimbabwe),Tanzania,and Uganda.Initial human MVD infections typically occur due to prolonged exposure to mines or caves inhabited by Rousettus aegyptiacus fruit bats,the natural hosts of the virus. 展开更多
关键词 laboratory use marburg virus disease mvd african green monkeys outbreaks social networks marburg virus disease case fatality rate web news mining
暂未订购
数字教材平台建设与应用研究——以Web开发系列教材为例 被引量:2
12
作者 刘德山 王志广 《辽宁师范大学学报(自然科学版)》 2025年第1期115-120,共6页
数字教材建设是教育数字化的重要内容之一.首先分析数字教材内涵和特征,梳理数字教材的建设途径.然后从前端学习和后台管理两个维度设计数字教材平台的功能模型,并给出媒体阅读、交互学习、资源管理、教学服务等模块的功能描述.最后,以... 数字教材建设是教育数字化的重要内容之一.首先分析数字教材内涵和特征,梳理数字教材的建设途径.然后从前端学习和后台管理两个维度设计数字教材平台的功能模型,并给出媒体阅读、交互学习、资源管理、教学服务等模块的功能描述.最后,以Web开发系列教材为例,实践数字教材建设模式,说明在嵌入第3方平台支持、与企业合作开发、配套资源建设等方面的应用效果. 展开更多
关键词 数字教材 平台 web开发
在线阅读 下载PDF
融合潜在联合词与异质关联兼容的Web API推荐
13
作者 胡强 綦浩泉 +1 位作者 李浩杰 杜军威 《软件学报》 北大核心 2025年第5期1949-1973,共25页
服务描述中包含的应用场景信息有限,使得以功能相似度计算为主的Mashup服务组件Web API推荐与需求预期常存在差异,功能匹配精确度有待进一步提高.部分研究者虽利用Web API的协作关联提升推荐兼容性,但忽视了功能关联对Mashup服务创建的... 服务描述中包含的应用场景信息有限,使得以功能相似度计算为主的Mashup服务组件Web API推荐与需求预期常存在差异,功能匹配精确度有待进一步提高.部分研究者虽利用Web API的协作关联提升推荐兼容性,但忽视了功能关联对Mashup服务创建的负反馈影响,从而限制了推荐多样性的提升.为此,提出一种融合潜在联合词与异质关联兼容的Mashup服务的组件Web API推荐方法.该方法为Mashup需求和Web API提取潜在应用场景联合词并融入到功能向量的生成中,进而提高二者功能相似度的匹配精确度,以获得高质量的候选组件Web API集合.将功能关联与协作关联建模为异质服务关联,并利用异质关联兼容替代传统方法中的协作兼容,以提升Web API的推荐多样性.相较于对比方法,所提方法在评价指标Recall、Precision和NDCG上分别提升了4.17%-16.05%,4.46%-16.62%与5.57%-17.26%,多样性指标ILS降低了8.22%-15.23%.冷启动Web API推荐的Recall与Precision指标值分别为非冷启动Web API推荐的47.71%和46.58%.实验结果表明所提方法不仅提升了Web API推荐质量,而且对冷启动Web API具有很好的推荐效果. 展开更多
关键词 Mashup服务 异质关联 web API推荐 多样性
在线阅读 下载PDF
智能体崛起:Web3.0的平台转型——兼论计算维度的媒介学 被引量:3
14
作者 孙玮 张祁锴 《现代出版》 北大核心 2025年第1期20-29,共10页
平台研究有隐喻和计算两个维度,大多持有“万物皆平台”的想法,关注平台提供的沟通、交互、销售的机会以及平台的数据集中化问题,是平台研究的主流视角。计算维度则强调平台的可编程性——计算技术作为平台的基础架构。这个维度深入平... 平台研究有隐喻和计算两个维度,大多持有“万物皆平台”的想法,关注平台提供的沟通、交互、销售的机会以及平台的数据集中化问题,是平台研究的主流视角。计算维度则强调平台的可编程性——计算技术作为平台的基础架构。这个维度深入平台的技术深层逻辑,展现不同阶段互联网平台的不同媒介性,超越了局限于信息内容使用与生产的既往平台研究。以计算维度考察当前Web3.0阶段的平台转型,会发现智能合约作为切入点,展现着平台计算基础变化影响下的政治结构、文化现象重塑;个体化智能体的应用,激发了Web3.0节点的主体动能,可编程的社会实践得以大规模展开。当前智能技术与互联网技术的历史性汇流,使得智能媒介的调节性跃升至一个新阶段,这为媒介学研究提供了崭新的经验场域,以及理论创新的机遇。 展开更多
关键词 智能体 web3.0 平台 计算维度 媒介学
在线阅读 下载PDF
“Web前端开发”课证融通教学改革研究 被引量:2
15
作者 刘晓娟 《信息与电脑》 2025年第7期248-250,共3页
文章以Web前端开发课程为例,探讨了课证融通教学改革。通过优化教学设计、改进教学模式和完善评价体系,明确教学目标,激发学生的学习主动性,提升实践技能和职业素养,增强教师教学能力,实现课程与职业技能标准对接,从而有效提高教学质量... 文章以Web前端开发课程为例,探讨了课证融通教学改革。通过优化教学设计、改进教学模式和完善评价体系,明确教学目标,激发学生的学习主动性,提升实践技能和职业素养,增强教师教学能力,实现课程与职业技能标准对接,从而有效提高教学质量与学生综合能力。 展开更多
关键词 web前端开发 1+X证书 课证融通 教学改革
在线阅读 下载PDF
基于HTML的Web系统在植保机中的应用研究
16
作者 陈伟卫 《农机化研究》 北大核心 2025年第3期181-185,共5页
为了实现农田信息的实时监控,将农田信息进行可视化处理,设计了本系统。植保机作为农田中数据采集节点和地面工作站的中继站,可实现将农田信息上传地面工作站,且可利用HTML完成农田数据的Web可视化处理。同时,依据通讯路径损耗,确定通... 为了实现农田信息的实时监控,将农田信息进行可视化处理,设计了本系统。植保机作为农田中数据采集节点和地面工作站的中继站,可实现将农田信息上传地面工作站,且可利用HTML完成农田数据的Web可视化处理。同时,依据通讯路径损耗,确定通讯频率为430M,植保机飞行高度为750 m;基于模拟退火算法,实现植保机飞行路径规划;利用HTML完成用户Web网页设计;并对系统进行测试。测试结果表明:土壤湿度监控精度相对误差分布区间为[0.57%, 2.79%],Web网页可以实现各数据节点农田信息的实时显示。 展开更多
关键词 植保机 路径规划 模拟退火算法 web可视化
在线阅读 下载PDF
基于响应相似性判定的Web越权漏洞测试方法
17
作者 宋虹 马俊龙 +2 位作者 王伟平 诸亿郎 王建新 《信息安全学报》 2025年第2期17-29,共13页
Web越权漏洞是一种允许攻击者以未授权的身份访问其他用户数据的高频Web应用漏洞。目前常用的越权漏洞人工测试方法主要依赖于安全专家对Web应用进行人工测试,效率低下,且对测试人员的专业要求较高;而现有的自动化漏洞测试方法主要针对... Web越权漏洞是一种允许攻击者以未授权的身份访问其他用户数据的高频Web应用漏洞。目前常用的越权漏洞人工测试方法主要依赖于安全专家对Web应用进行人工测试,效率低下,且对测试人员的专业要求较高;而现有的自动化漏洞测试方法主要针对Web应用中常见的XSS、SQL注入等漏洞,受网站业务逻辑异构性的影响,不适用于Web越权漏洞的检测。针对上述问题,本文提出了一种基于响应相似性判定的Web越权漏洞黑盒测试方法,该方法能够依据不同身份用户对同一访问接口的返回结果之间的差异性,推测接口需要的访问控制权限,从而发现具有访问权限要求的越权待测接口,降低了模糊测试所需的测试用例。然后通过替换访问请求中的身份标志,生成原用户的正常请求和越权用户的越权请求作为测试用例对待测接口进行测试,进而依据返回结果的相似性判定是否存在越权漏洞。在判定方法上采用Web响应结构相似性来判定属于同一接口的流量,采用Web响应内容相似性来判定越权待测接口和越权漏洞的存在与否。我们对开源网站和实际网站数据集进行了测试,结果表明,该方法能检测出开源网站中所有已知的越权漏洞,同时检测出了若干个之前未知的越权漏洞,并通过人工方式得到了验证。 展开更多
关键词 越权漏洞 黑盒测试 web安全
在线阅读 下载PDF
Python在组态软件Web发布中的研究
18
作者 卞瑞祥 周季峰 《工业控制计算机》 2025年第6期17-19,23,共4页
介绍了脚本语言在组态软件中的应用,分析了Web发布中集成Python脚本的难点,提出了组态脚本移植到Web浏览器上运行的三类解决方案及其优缺点,最终选择动态转译技术作为核心解决方案。结合组态脚本设置和运行的特点,给出了全局脚本和动作... 介绍了脚本语言在组态软件中的应用,分析了Web发布中集成Python脚本的难点,提出了组态脚本移植到Web浏览器上运行的三类解决方案及其优缺点,最终选择动态转译技术作为核心解决方案。结合组态脚本设置和运行的特点,给出了全局脚本和动作脚本在Web发布中的实现机制,并针对脚本联动、转译器加载提速和节点信息读取问题,提出了解决方案。研究证明动态转译技术可以快速有效地将组态脚本应用于Web发布。 展开更多
关键词 组态软件 PYTHON 动态转译 Brython web发布
在线阅读 下载PDF
基于Web2.0的前端开发框架设计和实现研究
19
作者 陈芳 《科技资讯》 2025年第13期26-28,共3页
随着Web2.0理念的提出,前端开发领域迎来了一场深远的变革。Web2.0理念着重突出用户的参与度与交互性,推动网页由原先单一的静态信息展示模式逐步演变为一个富含动态元素与高度交互性的平台。通过探讨基于Web2.0理念的前端开发框架设计... 随着Web2.0理念的提出,前端开发领域迎来了一场深远的变革。Web2.0理念着重突出用户的参与度与交互性,推动网页由原先单一的静态信息展示模式逐步演变为一个富含动态元素与高度交互性的平台。通过探讨基于Web2.0理念的前端开发框架设计,提出一种基于前端框架的逻辑架构体系,该体系深度融合了模块化设计理念、组件化思维方式等。 展开更多
关键词 前端开发 web应用前端 开发框架设计 用户界面
在线阅读 下载PDF
基于可配置Web开发平台的设计
20
作者 陈芳 《办公自动化》 2025年第7期26-28,共3页
针对当前Web软件开发周期长、功能重复等问题,文章设计基于可配置的Web开发平台,该平台基于先进的技术架构,融合多种主流的开发框架与工具,以满足不同类型Web应用的开发需求。运用业务逻辑将其以表单流、数据流、事件流形式呈现,该平台... 针对当前Web软件开发周期长、功能重复等问题,文章设计基于可配置的Web开发平台,该平台基于先进的技术架构,融合多种主流的开发框架与工具,以满足不同类型Web应用的开发需求。运用业务逻辑将其以表单流、数据流、事件流形式呈现,该平台能提升对Web报表页面的开发效率,可满足现代软件开发需求。 展开更多
关键词 web 开发平台 逻辑表 业务配置工具
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部