Results 81 to 90 of about 5,960 (196)

Enhanced Cybersecurity Framework for Unmanned Aerial Systems: A Comprehensive STRIDE‐Model Analysis and Emerging Defense Strategies

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns.
Hailong Xi   +8 more
wiley   +1 more source

XSShield: Defending Against Stored XSS Attacks Using LLM-Based Semantic Understanding

open access: yesApplied Sciences
Cross-site scripting attacks represent one of the major security threats facing web applications, with Stored XSS attacks becoming the predominant form. Compared to reflected XSS, stored XSS attack payloads exhibit temporal and spatial asynchrony between
Yuan Zhou   +7 more
doaj   +1 more source

Two‐Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Industrial control systems (ICSs) increasingly leverage the industrial internet of things (IIoTs) for sensor‐based automation, enhancing operational efficiency. However, the rapid expansion of the IIoTs brings with it an inherent susceptibility to potential threats from network intrusions, which pose risks to both the network infrastructure and ...
Jian Shu, Jiazhong Lu, Bhaskar Mondal
wiley   +1 more source

Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks

open access: yesExpert Systems, Volume 42, Issue 1, January 2025.
Abstract Currently, web services‐based applications have an important presence in public and private organizations. The vulnerabilities that these types of applications may have pose an inherent potential risk to the business model of these organizations.
Jesús‐Ángel Román‐Gallego   +3 more
wiley   +1 more source

XSS Attack Detection Method Based on CNN-BiLSTM-Attention

open access: yesApplied Sciences
Cross-site scripting (XSS) is one of the most common security threats to web applications, posing a serious challenge to network information security. Targetting the limitations of traditional detection methods in identifying complex XSS attacks, this ...
Zhiping Li   +3 more
doaj   +1 more source

MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique

open access: yesIEEE Access, 2019
Dynamic web applications play a vital role in providing resources manipulation and interaction between clients and servers. The features presently supported by browsers have raised business opportunities, by supplying high interactivity in web-based ...
Fawaz Mahiuob Mohammed Mokbal   +5 more
doaj   +1 more source

Preventing Cross-Site Scripting Attacks by Combining Classifiers [PDF]

open access: yes
Cross-Site Scripting (XSS) is one of the most popular attacks targeting web applications. Using XSS attackers can obtain sensitive information or obtain unauthorized privileges.
Howe, J. M., Mereani, F.
core  

An Empirical Analysis of Vulnerabilities in Python Packages for Web Applications

open access: yes, 2018
This paper examines software vulnerabilities in common Python packages used particularly for web development. The empirical dataset is based on the PyPI package repository and the so-called Safety DB used to track vulnerabilities in selected packages ...
Ruohonen, Jukka
core   +1 more source

Analisis Serangan Hacker Menggunakan Honeypot High Interaction [PDF]

open access: yes, 2017
Informasi merupakan asset Perusahaan yang harus dijaga kerahasiaannya dari akses pihak-pihak yang tidak bertanggungjawab. Aspek keamanan informasi yang harus dilindungi mencakup Confidentiality, Integrity dan Availability.
Putra, I. N. (I), Sari, W. P. (Wahyu)
core  

A NEW-AGE TECHNIQUE OF PHISHING USING XSS [PDF]

open access: yes
Since internet appeared, information about us are not safe anymore. There are constantly persons who are trying to penetrate a system or to steal data about other people.
Negrilă Alexandru
core  

Home - About - Disclaimer - Privacy