Results 51 to 60 of about 5,960 (196)

Detection of Reflected XSS Vulnerabilities Based on Paths-Attention Method

open access: yesApplied Sciences, 2023
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these ...
Xiaobo Tan   +3 more
doaj   +1 more source

The Cross-Site Scripting (XSS) Attack: A Comprehensive Review

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology
Cross-site scripting (XSS) is a critical threat to web applications, involving the insertion of malicious code to compromise user trust and extract sensitive information. This paper presents a comprehensive review of various XSS attack types, including Reflected, Persistent, DOM-based, Blind XSS, and Self-XSS.
null Prof. Jayanthkumar A Rathod   +6 more
openaire   +1 more source

ANALISIS CROSS-SITE SCRIPTING (XSS) INJECTION – REFLECTED XSS AND STORED XSS MENGGGUNAKAN FRAMEWORK OWASP 10

open access: yesJurnal Ilmiah Flash, 2023
Saat ini, banyak situs memanfaatkan sepenuhnya konten client-server (sebagian besar ditulis dalam JavaScript) untuk menembah pengalaman klien. Sebaliknya, tren ini  juga telah memperluas keberadaan dan frekuensi serangan cross-site scripting (XSS).
openaire   +2 more sources

Developing a Secure Cyberphysical System for Altitude Chambers

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre   +4 more
wiley   +1 more source

A Comprehensive Survey on LLM‐Based Network Management and Operations

open access: yesInternational Journal of Network Management, Volume 35, Issue 6, November/December 2025.
ABSTRACT The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule‐based methods, adopting advanced artificial intelligence (AI)‐driven
Jibum Hong   +2 more
wiley   +1 more source

Securing Web Applications from malware attacks using hybrid feature extraction [PDF]

open access: yes, 2018
In this technological era, many of the applications are taking the utilization of services of internet in order to cater to the needs of its users. With the rise in number of internet users, there's a substantial inflation within the internet attacks ...
Gopireddy Venkata, Kalyani   +2 more
core  

Baseline: Metrics for setting a baseline for web vulnerability scanners [PDF]

open access: yes, 2010
As web scanners are becoming more popular because they are faster and cheaper than security consultants, the trend of relying on these scanners also brings a great hazard: users can choose a weak or outdated scanner and trust incomplete results ...
Dai, Huning   +2 more
core   +2 more sources

Comparative Analysis of Machine Learning Algorithms for Cross-Site Scripting (XSS) Attack Detection

open access: yesJOIV: International Journal on Informatics Visualization
Cross-Site Scripting (XSS) attacks pose a significant cybersecurity threat by exploiting vulnerabilities in web applications to inject malicious scripts, enabling unauthorized access and execution of malicious code.
Khairatun Hisan Hamzah   +5 more
doaj   +1 more source

Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces

open access: yes, 2015
Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure.
Costin, Andrei   +2 more
core   +2 more sources

Intrusion recovery for database-backed web applications [PDF]

open access: yes, 2011
Warp is a system that helps users and administrators of web applications recover from intrusions such as SQL injection, cross-site scripting, and clickjacking attacks, while preserving legitimate user changes.
Chandra, Ramesh   +4 more
core   +4 more sources

Home - About - Disclaimer - Privacy