Results 1 to 10 of about 78,038 (262)

Fast and Clean: Auditable high-performance assembly via constraint solving

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Handwritten assembly is a widely used tool in the development of highperformance cryptography: By providing full control over instruction selection, instruction scheduling, and register allocation, highest performance can be unlocked.
Amin Abdulrahman   +3 more
doaj   +1 more source

Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks

open access: yesSensors, 2023
New techniques and tactics are being used to gain unauthorized access to the web that harm, steal, and destroy information. Protecting the system from many threats such as DDoS, SQL injection, cross-site scripting, etc., is always a challenging issue ...
Babu R. Dawadi   +2 more
doaj   +1 more source

Utilizing Object Capabilities to Improve Web Application Security [PDF]

open access: yesApplied Cybersecurity & Internet Governance, 2022
Nowadays, more and more applications are built with web technologies, such as HTML, CSS, and JavaScript, which are then executed in browsers. The web is utilized as an operating system independent application platform.
Michael Koppmann   +3 more
doaj   +1 more source

PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning

open access: yesIEEE Access, 2023
Cyber security confronts a tremendous challenge of maintaining the confidentiality and integrity of user’s private information such as password and PIN code.
Muzammil Ahmed   +6 more
doaj   +1 more source

Ensemble Machine Learning Approaches for Detection of SQL Injection Attack

open access: yesTehnički Glasnik, 2021
In the current era, SQL Injection Attack is a serious threat to the security of the ongoing cyber world particularly for many web applications that reside over the internet. Many webpages accept the sensitive information (e.g.
Umar Farooq
doaj   +1 more source

Measuring the Security Effectiveness of Machine Learning Methods Used Against Cyber Attacks in Web Applications

open access: yesGazi Üniversitesi Fen Bilimleri Dergisi, 2021
The rapid progress of technological developments in the global world, the people to closely follow these developments and share them have become the focus of cybercriminals.
Mesut TOĞAÇAR
doaj   +1 more source

Research on link detection technology based on dynamic browser fingerprint

open access: yes网络与信息安全学报, 2022
With the emergence of user privacy leakage and online fraud, traditional detection mechanisms can no longer stop the intensified attacks and new methods are needed to assist in web security detection.As a bridge between users and network data, browsers ...
Fan GAO, Jian WANG, Jiqiang LIU
doaj   +1 more source

Malicious URL Detection Based on Associative Classification

open access: yesEntropy, 2021
Cybercriminals use malicious URLs as distribution channels to propagate malware over the web. Attackers exploit vulnerabilities in browsers to install malware to have access to the victim’s computer remotely. The purpose of most malware is to gain access
Sandra Kumi, ChaeHo Lim, Sang-Gon Lee
doaj   +1 more source

The Internet: Where Did IT All Go Wrong?

open access: yesSCRIPTed: A Journal of Law, Technology & Society, 2008
It is hard to imagine life today without the Internet, and all of the benefits that it brings to our business and personal lives: convenient, cheap and instant communication across time zones and national boundaries; online shopping and banking; document
Robert Schifreen
doaj   +1 more source

Improved Phishing Attack Detection with Machine Learning: A Comprehensive Evaluation of Classifiers and Features

open access: yesApplied Sciences, 2023
In phishing attack detection, machine learning-based approaches are more effective than simple blacklisting strategies, as they can adapt to new types of attacks and do not require manual updates. However, for these approaches, the choice of features and
Sibel Kapan, Efnan Sora Gunal
doaj   +1 more source

Home - About - Disclaimer - Privacy