Results 21 to 30 of about 38,899 (287)

Detection of Reflected XSS Vulnerabilities Based on Paths-Attention Method

open access: yesApplied Sciences, 2023
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these ...
Xiaobo Tan   +3 more
doaj   +1 more source

Some security issues for web based frameworks [PDF]

open access: yes, 2010
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core   +1 more source

SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall

open access: yesJOIV: International Journal on Informatics Visualization, 2018
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson   +2 more
doaj   +1 more source

Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review

open access: yesSensors, 2022
Cross channel scripting (XCS) is a common web application vulnerability, which is a variant of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network protocol and smart devices that have web interfaces such as routers ...
Indushree M   +4 more
doaj   +1 more source

European Digital Libraries: Web Security Vulnerabilities [PDF]

open access: yes, 2010
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core   +2 more sources

How to design browser security and privacy alerts [PDF]

open access: yes, 2018
Browser security and privacy alerts must be designed to ensure they are of value to the end-user, and communicate risks efficiently. We performed a systematic literature review, producing a list of guidelines from the research.
Renaud, Karen, Shepherd, Lynsay
core   +6 more sources

A Neutrosophic Approach to Robust Web Security: Mitigating XSS Attacks [PDF]

open access: yesNeutrosophic Sets and Systems
Cross-Site Scripting (XSS) is one of the most grievous vulnerabilities-a pitfall through which web applications are affected. These types of attacks are complex, and the available threat landscape is always changing, making it hard for conventional ...
A. A. Salama   +6 more
doaj   +1 more source

Intelligent Detection for Big Data Scripting Attack Based on Image Processing Inspired Method and Vectorization [PDF]

open access: yesJisuanji gongcheng, 2020
In this paper,the methods similar to image processing and vectorization are used for the verctorization of access traffic corpus big data,and the intelligent detection for big data cross-site scripting attack is achieved.Besides,this paper uses methods ...
ZHANG Haijun, CHEN Yinghui
doaj   +1 more source

Recent developments of MCViNE and its applications at SNS [PDF]

open access: yes, 2019
MCViNE is an open source, object-oriented Monte Carlo neutron ray-tracing simulation software package. Its design allows for flexible, hierarchical representations of sophisticated instrument components such as detector systems, and samples with a ...
Abernathy, D. L.   +10 more
core   +3 more sources

Discovery and research of network security vulnerabilities based on Web application

open access: yes网络与信息安全学报, 2016
Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS ...
Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU
doaj   +3 more sources

Home - About - Disclaimer - Privacy