Results 51 to 60 of about 38,899 (287)

A PU‐learning based approach for cross‐site scripting attacking reality detection

open access: yesIET Networks
Cross‐site scripting (XSS) attack has been one of the most dangerous attacks in cyberspace security. Traditional methods essentially discover XSS attack by detecting malicious payloads in requests, which is unable to distinguish attacking attempts with ...
Wenbo Wang, Peng Yi, Huikai Xu
doaj   +1 more source

Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

open access: yes, 2010
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks.
Adam Kieyzun   +32 more
core   +2 more sources

Crime scripting: A systematic review [PDF]

open access: yes, 2019
The file attached to this record is the author's final peer reviewed version.More than two decades after the publication of Cornish’s seminal work about the script-theoretic approach to crime analysis, this article examines how the concept has been ...
Borrion, Hervé, DehghanNiri, Hashem
core   +1 more source

Toward Knowledge‐Based Workflows: A Semantic Approach to Atomistic Simulations for Mechanical and Thermodynamic Properties

open access: yesAdvanced Engineering Materials, EarlyView.
Knowledge‐based atomistic workflows are presented for mechanical and thermodynamic properties. By coupling modular simulations with ontology‐aligned metadata and provenance, Fe case studies on elastic behavior, defects, thermal properties, and Hall–Petch strengthening reveal how FAIR, queryable, and reusable simulation data can be generated. Mechanical
Abril Azócar Guzmán   +5 more
wiley   +1 more source

Automating SQL Injection and Cross-Site Scripting Vulnerability Remediation in Code

open access: yesSoftware
Internet-based distributed systems dominate contemporary software applications. To enable these applications to operate securely, software developers must mitigate the threats posed by malicious actors.
Kedar Sambhus, Yi Liu
doaj   +1 more source

Models and scenarios of implementation of threats for internet resources

open access: yesРоссийский технологический журнал, 2020
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj   +1 more source

3D‐Printed Sulfur‐Derived Polymers With Controlled Architectures for Lithium‐Sulfur Batteries

open access: yesAdvanced Functional Materials, EarlyView.
Rheology‐guided formulation design for direct ink writing enables the fabrication of 3D sulfur copolymer cathodes with controlled architectures for lithium‐sulfur batteries. The printed electrodes exhibit multiscale porosity and high sulfur utilization, delivering enhanced electrochemical performance compared to conventional cast electrodes.
Bin Ling   +7 more
wiley   +1 more source

Policy-agnostic programming on the client-side [PDF]

open access: yes, 2017
Browser security has become a major concern especially due to web pages becoming more complex. These web applications handle a lot of information, including sensitive data that may be vulnerable to attacks like data exfiltration, cross-site scripting ...
Palesha, Kushal
core   +1 more source

A Survey on Cross-Site Scripting Attacks

open access: yesCoRR, 2009
15 ...
Joaquín García-Alfaro   +1 more
openaire   +2 more sources

Control of Polarization and Polar Helicity in BiFeO3 by Epitaxial Strain and Interfacial Chemistry

open access: yesAdvanced Functional Materials, EarlyView.
In BiFeO3 thin films, the interplay of interfacial chemistry, electrostatics, and epitaxial strain is engineered to stabilize homohelicity in polarization textures at the domain scale. The synergistic use of a Bi2O2‐terminated Aurivillius buffer layer and a highly anisotropic compressive epitaxial strain offers new routes to control the polar‐texture ...
Elzbieta Gradauskaite   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy