Results 81 to 90 of about 5,960 (196)
Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns.
Hailong Xi +8 more
wiley +1 more source
XSShield: Defending Against Stored XSS Attacks Using LLM-Based Semantic Understanding
Cross-site scripting attacks represent one of the major security threats facing web applications, with Stored XSS attacks becoming the predominant form. Compared to reflected XSS, stored XSS attack payloads exhibit temporal and spatial asynchrony between
Yuan Zhou +7 more
doaj +1 more source
Two‐Stage Botnet Detection Method Based on Feature Selection for Industrial Internet of Things
Industrial control systems (ICSs) increasingly leverage the industrial internet of things (IIoTs) for sensor‐based automation, enhancing operational efficiency. However, the rapid expansion of the IIoTs brings with it an inherent susceptibility to potential threats from network intrusions, which pose risks to both the network infrastructure and ...
Jian Shu, Jiazhong Lu, Bhaskar Mondal
wiley +1 more source
Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks
Abstract Currently, web services‐based applications have an important presence in public and private organizations. The vulnerabilities that these types of applications may have pose an inherent potential risk to the business model of these organizations.
Jesús‐Ángel Román‐Gallego +3 more
wiley +1 more source
XSS Attack Detection Method Based on CNN-BiLSTM-Attention
Cross-site scripting (XSS) is one of the most common security threats to web applications, posing a serious challenge to network information security. Targetting the limitations of traditional detection methods in identifying complex XSS attacks, this ...
Zhiping Li +3 more
doaj +1 more source
Dynamic web applications play a vital role in providing resources manipulation and interaction between clients and servers. The features presently supported by browsers have raised business opportunities, by supplying high interactivity in web-based ...
Fawaz Mahiuob Mohammed Mokbal +5 more
doaj +1 more source
Preventing Cross-Site Scripting Attacks by Combining Classifiers [PDF]
Cross-Site Scripting (XSS) is one of the most popular attacks targeting web applications. Using XSS attackers can obtain sensitive information or obtain unauthorized privileges.
Howe, J. M., Mereani, F.
core
An Empirical Analysis of Vulnerabilities in Python Packages for Web Applications
This paper examines software vulnerabilities in common Python packages used particularly for web development. The empirical dataset is based on the PyPI package repository and the so-called Safety DB used to track vulnerabilities in selected packages ...
Ruohonen, Jukka
core +1 more source
Analisis Serangan Hacker Menggunakan Honeypot High Interaction [PDF]
Informasi merupakan asset Perusahaan yang harus dijaga kerahasiaannya dari akses pihak-pihak yang tidak bertanggungjawab. Aspek keamanan informasi yang harus dilindungi mencakup Confidentiality, Integrity dan Availability.
Putra, I. N. (I), Sari, W. P. (Wahyu)
core
A NEW-AGE TECHNIQUE OF PHISHING USING XSS [PDF]
Since internet appeared, information about us are not safe anymore. There are constantly persons who are trying to penetrate a system or to steal data about other people.
Negrilă Alexandru
core

