Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
A comparative analysis of the performance of JavaScript code execution environments: Node.js, Deno and Bun
Smirnov, Andrei Aleksandrovich, Podolskiy, Egor Aleksandrovich, Cherenkov, Artem Vyacheslavovich, Gosudarev, Ilia Borisovich
Published in Программные системы и вычислительные методы (01.04.2024)
Published in Программные системы и вычислительные методы (01.04.2024)
Get full text
Journal Article
Development of interactive biological web applications with R/Shiny
Jia, Lihua, Yao, Wen, Jiang, Yingru, Li, Yang, Wang, Zhizhan, Li, Haoran, Huang, Fangfang, Li, Jiaming, Chen, Tiantian, Zhang, Huiyong
Published in Briefings in bioinformatics (17.01.2022)
Published in Briefings in bioinformatics (17.01.2022)
Get full text
Journal Article
Stealing PINs via mobile sensors: actual risk versus user perception
Mehrnezhad, Maryam, Toreini, Ehsan, Shahandashti, Siamak F., Hao, Feng
Published in International journal of information security (01.06.2018)
Published in International journal of information security (01.06.2018)
Get full text
Journal Article
A Generalized Approach for Solving Web Form Constraints
Karthein, Bjorn, Staicu, Cristian-Alexandru, Zeller, Andreas
Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)
Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)
Get full text
Conference Proceeding
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
Rahimova, Irada, Qubadova, Firangiz, Asker zade, Barayat, Pohasii, Serhii
Published in Сучасні інформаційні системи (23.12.2019)
Published in Сучасні інформаційні системи (23.12.2019)
Get full text
Journal Article
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception
Mehrnezhad, Maryam, Toreini, Ehsan, Shahandashti, Siamak F, Feng, Hao
Published in arXiv.org (18.04.2017)
Published in arXiv.org (18.04.2017)
Get full text
Paper
Journal Article
USING A SERVICE WORKER TO PRESENT A THIRD-PARTY CRYPTOGRAPHIC CREDENTIAL
Year of Publication 19.04.2022
Get full text
Patent
SAFE-PDF: Robust Detection of JavaScript PDF Malware Using Abstract Interpretation
Jordan, Alexander, Gauthier, François, Hassanshahi, Behnaz, Zhao, David
Year of Publication 29.10.2018
Year of Publication 29.10.2018
Get full text
Journal Article
Vetting browser extensions for security vulnerabilities with VEX
Bandhakavi, Sruthi, Tiku, Nandit, Pittman, Wyatt, King, Samuel T., Madhusudan, P., Winslett, Marianne
Published in Communications of the ACM (01.09.2011)
Published in Communications of the ACM (01.09.2011)
Get full text
Magazine Article