Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Emanuel Tundrea"'
Autor:
Richard S Gunasekera, Komal K B Raja, Suresh Hewapathirana, Emanuel Tundrea, Vinodh Gunasekera, Thushara Galbadage, Paul A Nelson
Publikováno v:
PLoS ONE, Vol 19, Iss 8, p e0308834 (2024)
[This corrects the article DOI: 10.1371/journal.pone.0291260.].
Externí odkaz:
https://doaj.org/article/42786eb9c3ac49798f5f451023db35f7
Autor:
Richard S Gunasekera, Komal K B Raja, Suresh Hewapathirana, Emanuel Tundrea, Vinodh Gunasekera, Thushara Galbadage, Paul A Nelson
Publikováno v:
PLoS ONE, Vol 18, Iss 10, p e0291260 (2023)
With the numerous genomes sequenced today, it has been revealed that a noteworthy percentage of genes in a given taxon of organisms in the phylogenetic tree of life do not have orthologous sequences in other taxa. These sequences are commonly referre
Externí odkaz:
https://doaj.org/article/5b51d4ede3174873a656bec0c9cd1a04
Autor:
Sebastian Vaduva, Emanuel Tundrea
Publikováno v:
Journal of Ethics in Entrepreneurship and Technology, Vol 1, Iss 1, Pp 2-3 (2021)
Externí odkaz:
https://doaj.org/article/0c26e3933e2d4354a82cb09889bad4f2
Autor:
Richard S. Gunasekera, Komal K. B. Raja, Suresh Hewapathirana, Emanuel Tundrea, Vinodh Gunasekera, Thushara Galbadage, Paul A. Nelson
With the numerous genomes sequenced today, it has been revealed that a noteworthy percentage of genes in a given taxon of organisms in the phylogenetic tree of life do not have orthologous sequences in other taxa. These sequences are commonly referre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7e214a80aeef7882be13f2f8f9c52c7f
https://doi.org/10.1101/2022.02.01.478498
https://doi.org/10.1101/2022.02.01.478498
Publikováno v:
INTED2021 Proceedings.
Publikováno v:
INTED2021 Proceedings.
Autor:
Paul Barna, Emanuel Tundrea
Publikováno v:
INTED Proceedings.
Autor:
Emanuel Tundrea
Publikováno v:
INTED Proceedings.
Autor:
Emanuel Tundrea
Publikováno v:
4th International Multidisciplinary Scientific Conference on Social Sciences and Arts SGEM2017, MODERN SCIENCE.
Publikováno v:
Journal of Information Privacy and Security. 7:54-69
This paper examines a variety of sources that provide web application security vulnerabilities and incident data. In particular, the research tracks the impact of SQL Injection, Cross-Site Scripting and Cross-Site Request Forgery vulnerabilities. A c