Results 51 to 60 of about 38,899 (287)
A PU‐learning based approach for cross‐site scripting attacking reality detection
Cross‐site scripting (XSS) attack has been one of the most dangerous attacks in cyberspace security. Traditional methods essentially discover XSS attack by detecting malicious payloads in requests, which is unable to distinguish attacking attempts with ...
Wenbo Wang, Peng Yi, Huikai Xu
doaj +1 more source
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks.
Adam Kieyzun +32 more
core +2 more sources
Crime scripting: A systematic review [PDF]
The file attached to this record is the author's final peer reviewed version.More than two decades after the publication of Cornish’s seminal work about the script-theoretic approach to crime analysis, this article examines how the concept has been ...
Borrion, Hervé, DehghanNiri, Hashem
core +1 more source
Knowledge‐based atomistic workflows are presented for mechanical and thermodynamic properties. By coupling modular simulations with ontology‐aligned metadata and provenance, Fe case studies on elastic behavior, defects, thermal properties, and Hall–Petch strengthening reveal how FAIR, queryable, and reusable simulation data can be generated. Mechanical
Abril Azócar Guzmán +5 more
wiley +1 more source
Automating SQL Injection and Cross-Site Scripting Vulnerability Remediation in Code
Internet-based distributed systems dominate contemporary software applications. To enable these applications to operate securely, software developers must mitigate the threats posed by malicious actors.
Kedar Sambhus, Yi Liu
doaj +1 more source
Models and scenarios of implementation of threats for internet resources
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj +1 more source
3D‐Printed Sulfur‐Derived Polymers With Controlled Architectures for Lithium‐Sulfur Batteries
Rheology‐guided formulation design for direct ink writing enables the fabrication of 3D sulfur copolymer cathodes with controlled architectures for lithium‐sulfur batteries. The printed electrodes exhibit multiscale porosity and high sulfur utilization, delivering enhanced electrochemical performance compared to conventional cast electrodes.
Bin Ling +7 more
wiley +1 more source
Policy-agnostic programming on the client-side [PDF]
Browser security has become a major concern especially due to web pages becoming more complex. These web applications handle a lot of information, including sensitive data that may be vulnerable to attacks like data exfiltration, cross-site scripting ...
Palesha, Kushal
core +1 more source
A Survey on Cross-Site Scripting Attacks
15 ...
Joaquín García-Alfaro +1 more
openaire +2 more sources
Control of Polarization and Polar Helicity in BiFeO3 by Epitaxial Strain and Interfacial Chemistry
In BiFeO3 thin films, the interplay of interfacial chemistry, electrostatics, and epitaxial strain is engineered to stabilize homohelicity in polarization textures at the domain scale. The synergistic use of a Bi2O2‐terminated Aurivillius buffer layer and a highly anisotropic compressive epitaxial strain offers new routes to control the polar‐texture ...
Elzbieta Gradauskaite +5 more
wiley +1 more source

