Results 21 to 30 of about 155,949 (336)

Improved Phishing Attack Detection with Machine Learning: A Comprehensive Evaluation of Classifiers and Features

open access: yesApplied Sciences, 2023
In phishing attack detection, machine learning-based approaches are more effective than simple blacklisting strategies, as they can adapt to new types of attacks and do not require manual updates. However, for these approaches, the choice of features and
Sibel Kapan, Efnan Sora Gunal
doaj   +1 more source

Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites

open access: yesIEEE Access, 2022
Cryptojacking is often used by attackers as a means of gaining profits by exploiting users’ resources without their consent, despite the anticipated positive effect of browser-based cryptomining.
Hyunji Hong   +4 more
doaj   +1 more source

Robust Image Hashing Scheme Based on Low-Rank Decomposition and Path Integral LBP

open access: yesIEEE Access, 2019
This paper presents a robust image hashing algorithm that exploits low-rank decomposition and path integral local binary pattern (pi-LBP), referred to LRPL hashing.
Hengfu Yang, Jianping Yin, Ying Yang
doaj   +1 more source

Toward Exposing Timing-Based Probing Attacks in Web Applications

open access: yesSensors, 2017
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web
Jian Mao   +4 more
doaj   +1 more source

A Survey of Exploitation and Detection Methods of XSS Vulnerabilities

open access: yesIEEE Access, 2019
As web applications become more prevalent, web security becomes more and more important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common injection web vulnerability.
Miao Liu   +3 more
doaj   +1 more source

Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities

open access: yesApplied Sciences, 2023
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers.
Xuyan Song   +3 more
doaj   +1 more source

Learning DOM Trees of Web Pages by Subpath Kernel and Detecting Fake e-Commerce Sites

open access: yesMachine Learning and Knowledge Extraction, 2021
The subpath kernel is a class of positive definite kernels defined over trees, which has the following advantages for the purposes of classification, regression and clustering: it can be incorporated into a variety of powerful kernel machines including ...
Kilho Shin   +3 more
doaj   +1 more source

A Security-Oriented Analysis of Web Inclusions in the Italian Public Administration

open access: yesCybernetics and Information Technologies, 2018
Modern web sites serve content that browsers fetch automatically from a number of different web servers that may be placed anywhere in the world. Such content is essential for defining the appearance and behavior of a web site and is thus a potential ...
Bartoli A.   +4 more
doaj   +1 more source

Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to a Security Model With Cache

open access: yesIEEE Access, 2019
Security analysis of a web system is complicated, and thus analysis using formal methods to describe system specification mathematically has attracted attention.
Hayato Shimamoto   +5 more
doaj   +1 more source

Evaluation of Static Analysis on Web Applications [PDF]

open access: yesarXiv, 2022
Web services are becoming business-critical components, often deployed with critical software bugs that can be maliciously explored. Web vulnerability scanners allow the detection of security vulnerabilities in web services by stressing the service from the point of view of an attacker.
arxiv  

Home - About - Disclaimer - Privacy