Results 21 to 30 of about 38,899 (287)
Detection of Reflected XSS Vulnerabilities Based on Paths-Attention Method
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these ...
Xiaobo Tan +3 more
doaj +1 more source
Some security issues for web based frameworks [PDF]
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core +1 more source
SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson +2 more
doaj +1 more source
Cross channel scripting (XCS) is a common web application vulnerability, which is a variant of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network protocol and smart devices that have web interfaces such as routers ...
Indushree M +4 more
doaj +1 more source
European Digital Libraries: Web Security Vulnerabilities [PDF]
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core +2 more sources
How to design browser security and privacy alerts [PDF]
Browser security and privacy alerts must be designed to ensure they are of value to the end-user, and communicate risks efficiently. We performed a systematic literature review, producing a list of guidelines from the research.
Renaud, Karen, Shepherd, Lynsay
core +6 more sources
A Neutrosophic Approach to Robust Web Security: Mitigating XSS Attacks [PDF]
Cross-Site Scripting (XSS) is one of the most grievous vulnerabilities-a pitfall through which web applications are affected. These types of attacks are complex, and the available threat landscape is always changing, making it hard for conventional ...
A. A. Salama +6 more
doaj +1 more source
Intelligent Detection for Big Data Scripting Attack Based on Image Processing Inspired Method and Vectorization [PDF]
In this paper,the methods similar to image processing and vectorization are used for the verctorization of access traffic corpus big data,and the intelligent detection for big data cross-site scripting attack is achieved.Besides,this paper uses methods ...
ZHANG Haijun, CHEN Yinghui
doaj +1 more source
Recent developments of MCViNE and its applications at SNS [PDF]
MCViNE is an open source, object-oriented Monte Carlo neutron ray-tracing simulation software package. Its design allows for flexible, hierarchical representations of sophisticated instrument components such as detector systems, and samples with a ...
Abernathy, D. L. +10 more
core +3 more sources
Discovery and research of network security vulnerabilities based on Web application
Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS ...
Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU
doaj +3 more sources

