Results 21 to 30 of about 13,301 (286)
How to design browser security and privacy alerts [PDF]
Browser security and privacy alerts must be designed to ensure they are of value to the end-user, and communicate risks efficiently. We performed a systematic literature review, producing a list of guidelines from the research.
Renaud, Karen, Shepherd, Lynsay
core +6 more sources
With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there is a
Yong Fang +3 more
doaj +1 more source
An implementation of real-time detection of cross-site scripting attacks on cloud-based web applications using deep learning [PDF]
Cross-site scripting has caused considerable harm to the economy and individual privacy. Deep learning consists of three primary learning approaches, and it is made up of numerous strata of artificial neural networks.
Abasi, Williams Toro- +3 more
core +3 more sources
CODDLE: Code-Injection Detection With Deep Learning
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj +1 more source
Preventing Cross-Site Scripting Attacks by Combining Classifiers
Cross-Site Scripting (XSS) is one of the most popular attacks targeting web applications. Using XSS attackers can obtain sensitive information or obtain unauthorized privileges. This motivates building a system that can recognise a malicious script when the attacker attempts to store it on a server, preventing the XSS attack.
Fawaz A. Mereani, Jacob M. Howe
openaire +2 more sources
X-Secure:protecting users from big bad wolves [PDF]
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity.
Bellekens, Xavier +3 more
core +3 more sources
Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System
With improvement in computing and technological advancements, web-based applications are now ubiquitous on the Internet. However, these web applications are becoming prone to vulnerabilities which have led to theft of confidential information, data loss,
Bakare K. Ayeni +2 more
doaj +1 more source
Crime scripting: A systematic review [PDF]
The file attached to this record is the author's final peer reviewed version.More than two decades after the publication of Cornish’s seminal work about the script-theoretic approach to crime analysis, this article examines how the concept has been ...
Borrion, Hervé, DehghanNiri, Hashem
core +1 more source
Attacks and Defenses for Vulnerability of Cross Site Scripting
Cross Site Scripting enables hackers to steal other user`s information (such as cookie, session etc.) or to do abnormal functions automatically using vulnerability of web application. This attack patterns of Cross Site Scripting(XSS) can be divided into two types.
Eun-Jung Choi +2 more
openaire +2 more sources
A Tutorial on Cross Site Scripting Attack - Defense
The danger is still very large from cross site scripting attacks. When designing web applications We must follow as much as we can prevention rules and don’t leave any loophole to our programs. Experience is a great factor for programmers to know these attacks and for a trainee programmer is a difficult task to spot all the weak points.
Vassilis Papaspirou +2 more
openaire +2 more sources

