Results 231 to 240 of about 38,899 (287)
Assessing the accuracy of binding pose prediction for kinase proteins and 7-azaindole inhibitors: a study with AutoDock4, Vina, DOCK 6, and GNINA 1.0. [PDF]
Tripathi A, Suri K, K S, Murugan NA.
europepmc +1 more source
Structural and Dynamic Perturbations in the RyR1 Selectivity Filter Induced by Ala4893 Mutations: Implications for Malignant Hyperthermia and Myopathy. [PDF]
Taweechat P +3 more
europepmc +1 more source
Defending against Cross-Site Scripting Attacks
Researchers have proposed multiple solutions to cross-site scripting, but vulnerabilities continue to exist in many Web applications due to developers' lack of understanding of the problem and their unfamiliarity with current defenses' strengths and limitations.
Lwin Khin Shar, Hee Beng Kuan Tan
exaly +5 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC), 2022
Voo Teck En, Vinesha Selvarajah
exaly +2 more sources
Voo Teck En, Vinesha Selvarajah
exaly +2 more sources
2011
As any other computer program, Web applications are susceptible of including vulnerabilities that may not only disrupt the provided service, but also facilitate private and personal information to an attacker. As these applications are usually public or even publicized, attacks are expected to be more and more frequent, making it necessary to supply ...
Almudena Alcaide Raya +3 more
openaire +1 more source
As any other computer program, Web applications are susceptible of including vulnerabilities that may not only disrupt the provided service, but also facilitate private and personal information to an attacker. As these applications are usually public or even publicized, attacks are expected to be more and more frequent, making it necessary to supply ...
Almudena Alcaide Raya +3 more
openaire +1 more source
2020
Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various
B. B. Gupta, Pooja Chaudhary
openaire +1 more source
Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various
B. B. Gupta, Pooja Chaudhary
openaire +1 more source
Caught in the cross-site scripting fire
Network Security, 2012Programming is back on the curriculum. The goal of the Raspberry Pi Foundation is to promote computing education by taking children back to the basics of programming computers and to “foster a renaissance in coding”, in the words of Raspberry Pi Foundation's director, Eben Upton.
openaire +1 more source
Static detection of cross-site scripting vulnerabilities
Proceedings of the 30th international conference on Software engineering, 2008Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an attacker exploits the trust a web client (browser) has for a trusted server and executes injected script on the browser with the server's privileges. In 2006, XSS constituted
Gary Wassermann, Zhendong Su 0001
openaire +1 more source
Client-side cross-site scripting protection
Computers & Security, 2009Web applications are becoming the dominant way to provide access to online services. At the same time, web application vulnerabilities are being discovered and disclosed at an alarming rate. Web applications often make use of JavaScript code that is embedded into web pages to support dynamic client-side behavior.
Engin Kirda +3 more
openaire +1 more source
Preventing Cross-Site Scripting
2010We continue our survey of secure PHP programming by discussing the threat to your users’ data posed by a highly specialized version of dangerous user input known as cross-site scripting (XSS). Unlike SQL injection (discussed in Chapter 3), which attempts to insert malicious SQL instructions into a database query that is executed out of public view, XSS
Chris Snyder +2 more
openaire +1 more source

