Zobrazeno 1 - 10
of 154
pro vyhledávání: '"Heather Richter"'
Autor:
Diana McSpadden, Steven Goldenberg, Binata Roy, Malachi Schram, Jonathan L. Goodall, Heather Richter
Publikováno v:
Machine Learning with Applications, Vol 15, Iss , Pp 100518- (2024)
Low-lying coastal cities, exemplified by Norfolk, Virginia, face the challenge of street flooding caused by rainfall and tides, which strain transportation and sewer systems and can lead to personal and property damage. While high-fidelity, physics-b
Externí odkaz:
https://doaj.org/article/0f4e6ce0bed9483794f2c67429f74963
Autor:
Nicole S. Hutton, George McLeod, Thomas R. Allen, Christopher Davis, Alexandra Garnand, Heather Richter, Prachi P. Chavan, Leslie Hoglund, Jill Comess, Matthew Herman, Brian Martin, Cynthia Romero
Publikováno v:
International Journal of Health Geographics, Vol 21, Iss 1, Pp 1-17 (2022)
Abstract Background Food is not equitably available. Deficiencies and generalizations limit national datasets, food security assessments, and interventions. Additional neighborhood level studies are needed to develop a scalable and transferable proce
Externí odkaz:
https://doaj.org/article/f6f86ab3d29a4eeabef124ca539fde90
Autor:
Klemmer, Jan H., Horstmann, Stefan Albert, Patnaik, Nikhil, Ludden, Cordelia, Burton Jr., Cordell, Powers, Carson, Massacci, Fabio, Rahman, Akond, Votipka, Daniel, Lipford, Heather Richter, Rashid, Awais, Naiakshina, Alena, Fahl, Sascha
Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub Copilot, the software industry quickly utilized these tools for software development tasks, e.g., generating code or consulting AI for advice. While recent research ha
Externí odkaz:
http://arxiv.org/abs/2405.06371
As adoption of mobile phones has skyrocketed, so have scams involving them. The text method is called SMiShing, (aka SMShing, or smishing) in which a fraudster sends a phishing link via Short Message Service (SMS) text to a phone. However, no data ex
Externí odkaz:
http://arxiv.org/abs/2309.06322
Publikováno v:
Journal of Advanced Research, Vol 5, Iss 4, Pp 449-462 (2014)
Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special
Externí odkaz:
https://doaj.org/article/0b3df65a3bb84a44b59d632ed2314c31
Autor:
Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, Jennifer Romano
This open access book provides researchers and professionals with a foundational understanding of online privacy as well as insight into the socio-technical privacy issues that are most pertinent to modern information systems, covering several modern
The best practice to prevent Cross Site Scripting (XSS) attacks is to apply encoders to sanitize untrusted data. To balance security and functionality, encoders should be applied to match the web page context, such as HTML body, JavaScript, and style
Externí odkaz:
http://arxiv.org/abs/1804.01862
Input sanitization mechanisms are widely used to mitigate vulnerabilities to injection attacks such as cross-site scripting. Static analysis tools and techniques commonly used to ensure that applications utilize sanitization functions. Dynamic analys
Externí odkaz:
http://arxiv.org/abs/1804.00753
Integrating security testing into the workflow of software developers not only can save resources for separate security testing but also reduce the cost of fixing security vulnerabilities by detecting them early in the development cycle. We present a
Externí odkaz:
http://arxiv.org/abs/1804.00754
The best practice to prevent Cross Site Scripting (XSS) attacks is to apply encoders to sanitize untrusted data. To balance security and functionality, encoders should be applied to match the web page context, such as HTML body, JavaScript, and style
Externí odkaz:
http://arxiv.org/abs/1804.00755