نتایج جستجو برای: data sanitization
تعداد نتایج: 2410486 فیلتر نتایج به سال:
Personal information is increasingly gathered and used for providing services tailored to user preferences, but the datasets used to provide such functionality can represent serious privacy threats if not appropriately protected. Work in privacy-preserving data publishing targeted privacy guarantees that protect against record re-identification, by making records indistinguishable, or sensitive...
This work describes disposable plasma generators made from metallized paper. The fabricated plasma generators with layered and patterned sheets of paper provide a simple and flexible format for dielectric barrier discharge to create atmospheric plasma without an applied vacuum. The porosity of paper allows gas to permeate its bulk volume and fuel plasma, while plasma-induced forced convection c...
Lettuce is a leafy vegetable widely used in industry for minimally processed products, in which the step of sanitization is the crucial moment for ensuring a safe food for consumption. Chlorinated compounds, mainly sodium hypochlorite, are the most used in Brazil, but the formation of trihalomethanes from this sanitizer is a drawback. Then, the search for alternative methods to sodium hypochlor...
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in...
Shiga toxin-producing Escherichia coli (STEC) strains are important foodborne pathogens. Among these, E. coli O157:H7 is the most frequently isolated STEC serotype responsible for foodborne diseases. However, the non-O157 serotypes have been associated with serious outbreaks and sporadic diseases as well. It has been shown that various STEC serotypes are capable of forming biofilms on differen...
Many of today’s privacy-preserving tools create a big file that fills up a hard drive or USB storage device in an effort to overwrite all of the “deleted files” that the media contain. But while this technique is widespread, it is largely unvalidated. We evaluate the effectiveness of the “big file technique” using sectorby-sector disk imaging on file systems running under Windows, Mac OS, Linux...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید