Results 21 to 30 of about 13,301 (286)

How to design browser security and privacy alerts [PDF]

open access: yes, 2018
Browser security and privacy alerts must be designed to ensure they are of value to the end-user, and communicate risks efficiently. We performed a systematic literature review, producing a list of guidelines from the research.
Renaud, Karen, Shepherd, Lynsay
core   +6 more sources

RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning

open access: yesFuture Internet, 2019
With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there is a
Yong Fang   +3 more
doaj   +1 more source

An implementation of real-time detection of cross-site scripting attacks on cloud-based web applications using deep learning [PDF]

open access: yes, 2021
Cross-site scripting has caused considerable harm to the economy and individual privacy. Deep learning consists of three primary learning approaches, and it is made up of numerous strata of artificial neural networks.
Abasi, Williams Toro-   +3 more
core   +3 more sources

CODDLE: Code-Injection Detection With Deep Learning

open access: yesIEEE Access, 2019
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj   +1 more source

Preventing Cross-Site Scripting Attacks by Combining Classifiers

open access: yesProceedings of the 10th International Joint Conference on Computational Intelligence, 2018
Cross-Site Scripting (XSS) is one of the most popular attacks targeting web applications. Using XSS attackers can obtain sensitive information or obtain unauthorized privileges. This motivates building a system that can recognise a malicious script when the attacker attempts to store it on a server, preventing the XSS attack.
Fawaz A. Mereani, Jacob M. Howe
openaire   +2 more sources

X-Secure:protecting users from big bad wolves [PDF]

open access: yes, 2016
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity.
Bellekens, Xavier   +3 more
core   +3 more sources

Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System

open access: yesJournal of Computer Networks and Communications, 2018
With improvement in computing and technological advancements, web-based applications are now ubiquitous on the Internet. However, these web applications are becoming prone to vulnerabilities which have led to theft of confidential information, data loss,
Bakare K. Ayeni   +2 more
doaj   +1 more source

Crime scripting: A systematic review [PDF]

open access: yes, 2019
The file attached to this record is the author's final peer reviewed version.More than two decades after the publication of Cornish’s seminal work about the script-theoretic approach to crime analysis, this article examines how the concept has been ...
Borrion, Hervé, DehghanNiri, Hashem
core   +1 more source

Attacks and Defenses for Vulnerability of Cross Site Scripting

open access: yesJournal of Digital Convergence, 2015
Cross Site Scripting enables hackers to steal other user`s information (such as cookie, session etc.) or to do abnormal functions automatically using vulnerability of web application. This attack patterns of Cross Site Scripting(XSS) can be divided into two types.
Eun-Jung Choi   +2 more
openaire   +2 more sources

A Tutorial on Cross Site Scripting Attack - Defense

open access: yes, 2020
The danger is still very large from cross site scripting attacks. When designing web applications We must follow as much as we can prevention rules and don’t leave any loophole to our programs. Experience is a great factor for programmers to know these attacks and for a trainee programmer is a difficult task to spot all the weak points.
Vassilis Papaspirou   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy