Results 21 to 30 of about 4,673,218 (333)

A Survey of Exploitation and Detection Methods of XSS Vulnerabilities

open access: yesIEEE Access, 2019
As web applications become more prevalent, web security becomes more and more important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common injection web vulnerability.
Miao Liu   +3 more
doaj   +1 more source

Toward Exposing Timing-Based Probing Attacks in Web Applications

open access: yesSensors, 2017
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web
Jian Mao   +4 more
doaj   +1 more source

Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities

open access: yesApplied Sciences, 2023
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers.
Xuyan Song   +3 more
doaj   +1 more source

Learning DOM Trees of Web Pages by Subpath Kernel and Detecting Fake e-Commerce Sites

open access: yesMachine Learning and Knowledge Extraction, 2021
The subpath kernel is a class of positive definite kernels defined over trees, which has the following advantages for the purposes of classification, regression and clustering: it can be incorporated into a variety of powerful kernel machines including ...
Kilho Shin   +3 more
doaj   +1 more source

European Digital Libraries: Web Security Vulnerabilities [PDF]

open access: yes, 2010
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core   +2 more sources

Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites

open access: yesIEEE Access, 2022
Cryptojacking is often used by attackers as a means of gaining profits by exploiting users’ resources without their consent, despite the anticipated positive effect of browser-based cryptomining.
Hyunji Hong   +4 more
doaj   +1 more source

Validating a Web Service Security Abstraction by Typing [PDF]

open access: yes, 2004
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core   +2 more sources

BlackWatch:increasing attack awareness within web applications [PDF]

open access: yes, 2019
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents.
Coull, Natalie   +2 more
core   +3 more sources

Web Security: Detection of Cross Site Scripting in PHP Web Application using Genetic Algorithm

open access: yes, 2017
Cross site scripting (XSS) is one of the major threats to the web application security, where the research is still underway for an effective and useful way to analyse the source code of web application and removes this threat.
Abdalla Wasef Marashdih   +2 more
semanticscholar   +1 more source

An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications

open access: yesIEEE Access, 2020
Security and usability are often thought of as being contradictive in nature. One affects the other negatively. The relation and trade-offs between usability and security must be detected during developing web application to satisfy the user’s ...
Rajeev Kumar   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy