Results 71 to 80 of about 5,960 (196)

A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks

open access: yesFuture Internet
As the Internet of Things (IoT) expands rapidly and 5G networks become more widespread, the need for strong cybersecurity measures in IoT systems has become increasingly critical.
Mahmoud AlJamal   +6 more
doaj   +1 more source

Early PCOS Detection: A Comparative Analysis of Traditional and Ensemble Machine Learning Models With Advanced Feature Selection

open access: yesEngineering Reports, Volume 7, Issue 2, February 2025.
A comparative analysis of traditional and ensemble machine learning models with advanced feature selection to detect polycystic ovary syndrome. ABSTRACT PCOS (polycystic ovary syndrome) is a common hormonal disorder that affects many women during their reproductive years.
Khandaker Mohammad Mohi Uddin   +4 more
wiley   +1 more source

Efficient Detection of XSS and DDoS Attacks with Bent Functions

open access: yesInformation
In this paper, we investigate the use of Bent functions, particularly the Maiorana–McFarland (M–M) construction, as a nonlinear preprocessing method to enhance machine learning-based detection systems for Distributed Denial of Service (DDoS) and Cross ...
Shahram Miri Kelaniki, Nikos Komninos
doaj   +1 more source

A multi-agent scanner to detect stored-XSS vulnerabilities [PDF]

open access: yes, 2010
Proceeding of: 2010 International Conference for Internet Technology and Secured Transactions (ICITST), 8 to 11 November 2010 London, England, United KingdomThe cross-site scripting (XSS) has become a common vulnerability of many web sites and web ...
Alcaide Raya, Almudena   +3 more
core   +2 more sources

CIDER: Cyber‐Security in Industrial IoT Using Deep Learning and Ring Learning with Errors

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
This paper proposes secure measures using deep machine learning‐based intrusion detection and advanced encryption schemes based on lattice‐based cryptography on the cloud‐edge‐fog IIoT architecture. The evaluation experiments performed on the Ton_IoT dataset show that the deep learning models have a very good accuracy of around 92% for attack ...
Siu Ting Tsoi, Anish Jindal
wiley   +1 more source

DISADVANTAGES PRESENTED BY HTML INLINE FRAMES IN INTEGRATION OF 3rd PARTY CONTENT [PDF]

open access: yes
As new virtual structures emerge, new applications, new widgets, new services become available to embed in websites. One of the preferred solutions for embedding 3rd party content is the HTML Inline Frame or iFrame.
Joița Alin-Cristian
core  

Using Lightweight Formal Methods for JavaScript Security [PDF]

open access: yes, 2010
The goal of this work was to apply lightweight formal methods to the study of the security of the JavaScript language. Previous work has shown that lightweight formal methods present a new approach to the study of security in the context of the Java ...
Reynolds, Mark
core   +1 more source

A Methodological Framework to Hybrid Machine Learning for Detecting Unusual Cyberattacks in Internet of Things

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Background: The Internet of Things (IoT) represents one of the fastest‐expanding developments in the computer industry. However, the inherently hostile environment of the internet makes IoT systems vulnerable. A popular and promising method for detecting cyberattacks is machine learning (ML), which produces excellent outcomes for identified attacks ...
R. S. Ramya, S. Jayanthy, Peican Zhu
wiley   +1 more source

CAXF-LCCDE: An Enhanced Feature Extraction and Ensemble Learning Model for XSS Detection

open access: yesIEEE Access
Threats to businesses, organizations, and individuals have become more complicated and varied due to the constant evolution of cyberattack strategies brought about by the quick development of Internet technologies.
Man Hua   +3 more
doaj   +1 more source

Perbandingan Sistem Keamanan Pengembangan Aplikasi Website Web 2.0 Menggunakan Framework Ruby on Rails Dan Cakephp [PDF]

open access: yes, 2010
Web 2.0 merupakan istilah yang digunakan untuk menunjukkan berbagai layanan di web yang memungkinkan pemakai untuk berkolaborasi dan berbagi informasi secara online. Teknologi Web 2.0 menggunakan teknologi yang sejak lama dikembangkan untuk web, ditambah
Sahid, S. (Sahid), Utami, E. (Ema)
core  

Home - About - Disclaimer - Privacy