Results 11 to 20 of about 13,301 (286)
Models and scenarios of implementation of threats for internet resources
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection.
S. A. Lesko
doaj +1 more source
Security Performance Analysis of Photography Service System
Photography business become more popular and trending among the most of people who likes photography. Photography Service System was developed to help photography companies to deliver photos and videos to their customers.
Nur Khairani Kamarudin +4 more
doaj +5 more sources
Cross-site scripting (XSS) attacks have been extensively studied in the literature, although mitigating such attacks remain a challenge for cyber defenders. In this paper, we survey the existing literature on XSS attacks, focusing on the range of attacks
Dragan Korać +3 more
doaj +1 more source
A Neutrosophic Approach to Robust Web Security: Mitigating XSS Attacks [PDF]
Cross-Site Scripting (XSS) is one of the most grievous vulnerabilities-a pitfall through which web applications are affected. These types of attacks are complex, and the available threat landscape is always changing, making it hard for conventional ...
A. A. Salama +6 more
doaj +1 more source
Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review
Web applications are paramount tools for facilitating services providing in the modern world. Unfortunately, the tremendous growth in the web application usage has resulted in a rise in cyberattacks. Cross-site scripting (XSS) is one of the most frequent
Isam Kareem Thajeel +3 more
doaj +1 more source
Current state of research on cross-site scripting (XSS) – a systematic literature review [PDF]
Context: Cross-site scripting (XSS) is a security vulnerability that affects web applications. It occurs due to improper or lack of sanitization of user inputs. The security vulnerability caused many problems for users and server applications. Objective:
Admodisastro , Novia Indriaty +3 more
core +1 more source
Some security issues for web based frameworks [PDF]
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core +1 more source
A Survey on Cross-Site Scripting Attacks
15 ...
Joaquín García-Alfaro +1 more
openaire +2 more sources
Cross-site scripting attack detection based on a modified convolution neural network
Cross-site scripting (XSS) attacks are currently one of the most threatening network attack methods. Effectively detecting and intercepting XSS attacks is an important research topic in the network security field. This manuscript proposes a convolutional
Huyong Yan +16 more
doaj +1 more source
European Digital Libraries: Web Security Vulnerabilities [PDF]
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core +2 more sources

