Results 21 to 30 of about 1,157,333 (342)

Research on link detection technology based on dynamic browser fingerprint

open access: yes网络与信息安全学报, 2022
With the emergence of user privacy leakage and online fraud, traditional detection mechanisms can no longer stop the intensified attacks and new methods are needed to assist in web security detection.As a bridge between users and network data, browsers ...
Fan GAO, Jian WANG, Jiqiang LIU
doaj   +1 more source

Malicious URL Detection Based on Associative Classification

open access: yesEntropy, 2021
Cybercriminals use malicious URLs as distribution channels to propagate malware over the web. Attackers exploit vulnerabilities in browsers to install malware to have access to the victim’s computer remotely. The purpose of most malware is to gain access
Sandra Kumi, ChaeHo Lim, Sang-Gon Lee
doaj   +1 more source

European Digital Libraries: Web Security Vulnerabilities [PDF]

open access: yes, 2010
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core   +2 more sources

Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities

open access: yesApplied Sciences, 2023
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers.
Xuyan Song   +3 more
doaj   +1 more source

Some security issues for web based frameworks [PDF]

open access: yes, 2010
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core   +1 more source

Secure sessions for web services [PDF]

open access: yesProceedings of the 2004 workshop on Secure web service - SWS '04, 2004
We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is rather inefficient; moreover, it is often ...
Bhargavan, Karthikeyan   +3 more
openaire   +3 more sources

Validating a Web Service Security Abstraction by Typing [PDF]

open access: yes, 2004
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core   +2 more sources

Protecting web services with service oriented traceback architecture [PDF]

open access: yes, 2008
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley   +2 more
core   +2 more sources

SafeWeb: A Middleware for Securing Ruby-Based Web Applications [PDF]

open access: yes, 2011
Web applications in many domains such as healthcare and finance must process sensitive data, while complying with legal policies regarding the release of different classes of data to different parties.
A. Chaudhuri   +15 more
core   +7 more sources

A Security-Oriented Analysis of Web Inclusions in the Italian Public Administration

open access: yesCybernetics and Information Technologies, 2018
Modern web sites serve content that browsers fetch automatically from a number of different web servers that may be placed anywhere in the world. Such content is essential for defining the appearance and behavior of a web site and is thus a potential ...
Bartoli A.   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy