Results 51 to 60 of about 5,960 (196)
Detection of Reflected XSS Vulnerabilities Based on Paths-Attention Method
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these ...
Xiaobo Tan +3 more
doaj +1 more source
The Cross-Site Scripting (XSS) Attack: A Comprehensive Review
Cross-site scripting (XSS) is a critical threat to web applications, involving the insertion of malicious code to compromise user trust and extract sensitive information. This paper presents a comprehensive review of various XSS attack types, including Reflected, Persistent, DOM-based, Blind XSS, and Self-XSS.
null Prof. Jayanthkumar A Rathod +6 more
openaire +1 more source
Saat ini, banyak situs memanfaatkan sepenuhnya konten client-server (sebagian besar ditulis dalam JavaScript) untuk menembah pengalaman klien. Sebaliknya, tren ini juga telah memperluas keberadaan dan frekuensi serangan cross-site scripting (XSS).
openaire +2 more sources
Developing a Secure Cyberphysical System for Altitude Chambers
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre +4 more
wiley +1 more source
A Comprehensive Survey on LLM‐Based Network Management and Operations
ABSTRACT The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule‐based methods, adopting advanced artificial intelligence (AI)‐driven
Jibum Hong +2 more
wiley +1 more source
Securing Web Applications from malware attacks using hybrid feature extraction [PDF]
In this technological era, many of the applications are taking the utilization of services of internet in order to cater to the needs of its users. With the rise in number of internet users, there's a substantial inflation within the internet attacks ...
Gopireddy Venkata, Kalyani +2 more
core
Baseline: Metrics for setting a baseline for web vulnerability scanners [PDF]
As web scanners are becoming more popular because they are faster and cheaper than security consultants, the trend of relying on these scanners also brings a great hazard: users can choose a weak or outdated scanner and trust incomplete results ...
Dai, Huning +2 more
core +2 more sources
Comparative Analysis of Machine Learning Algorithms for Cross-Site Scripting (XSS) Attack Detection
Cross-Site Scripting (XSS) attacks pose a significant cybersecurity threat by exploiting vulnerabilities in web applications to inject malicious scripts, enabling unauthorized access and execution of malicious code.
Khairatun Hisan Hamzah +5 more
doaj +1 more source
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure.
Costin, Andrei +2 more
core +2 more sources
Intrusion recovery for database-backed web applications [PDF]
Warp is a system that helps users and administrators of web applications recover from intrusions such as SQL injection, cross-site scripting, and clickjacking attacks, while preserving legitimate user changes.
Chandra, Ramesh +4 more
core +4 more sources

