Results 21 to 30 of about 155,949 (336)
In phishing attack detection, machine learning-based approaches are more effective than simple blacklisting strategies, as they can adapt to new types of attacks and do not require manual updates. However, for these approaches, the choice of features and
Sibel Kapan, Efnan Sora Gunal
doaj +1 more source
Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites
Cryptojacking is often used by attackers as a means of gaining profits by exploiting users’ resources without their consent, despite the anticipated positive effect of browser-based cryptomining.
Hyunji Hong+4 more
doaj +1 more source
Robust Image Hashing Scheme Based on Low-Rank Decomposition and Path Integral LBP
This paper presents a robust image hashing algorithm that exploits low-rank decomposition and path integral local binary pattern (pi-LBP), referred to LRPL hashing.
Hengfu Yang, Jianping Yin, Ying Yang
doaj +1 more source
Toward Exposing Timing-Based Probing Attacks in Web Applications
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web
Jian Mao+4 more
doaj +1 more source
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities
As web applications become more prevalent, web security becomes more and more important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common injection web vulnerability.
Miao Liu+3 more
doaj +1 more source
Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers.
Xuyan Song+3 more
doaj +1 more source
Learning DOM Trees of Web Pages by Subpath Kernel and Detecting Fake e-Commerce Sites
The subpath kernel is a class of positive definite kernels defined over trees, which has the following advantages for the purposes of classification, regression and clustering: it can be incorporated into a variety of powerful kernel machines including ...
Kilho Shin+3 more
doaj +1 more source
A Security-Oriented Analysis of Web Inclusions in the Italian Public Administration
Modern web sites serve content that browsers fetch automatically from a number of different web servers that may be placed anywhere in the world. Such content is essential for defining the appearance and behavior of a web site and is thus a potential ...
Bartoli A.+4 more
doaj +1 more source
Security analysis of a web system is complicated, and thus analysis using formal methods to describe system specification mathematically has attracted attention.
Hayato Shimamoto+5 more
doaj +1 more source
Evaluation of Static Analysis on Web Applications [PDF]
Web services are becoming business-critical components, often deployed with critical software bugs that can be maliciously explored. Web vulnerability scanners allow the detection of security vulnerabilities in web services by stressing the service from the point of view of an attacker.
arxiv