Results 21 to 30 of about 1,157,333 (342)
Research on link detection technology based on dynamic browser fingerprint
With the emergence of user privacy leakage and online fraud, traditional detection mechanisms can no longer stop the intensified attacks and new methods are needed to assist in web security detection.As a bridge between users and network data, browsers ...
Fan GAO, Jian WANG, Jiqiang LIU
doaj +1 more source
Malicious URL Detection Based on Associative Classification
Cybercriminals use malicious URLs as distribution channels to propagate malware over the web. Attackers exploit vulnerabilities in browsers to install malware to have access to the victim’s computer remotely. The purpose of most malware is to gain access
Sandra Kumi, ChaeHo Lim, Sang-Gon Lee
doaj +1 more source
European Digital Libraries: Web Security Vulnerabilities [PDF]
Purpose – The purpose of this paper is to investigate the web vulnerability challenges at European library web sites and how these issues can affect the data protection of their patrons.
Kuzma, Joanne
core +2 more sources
Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers.
Xuyan Song +3 more
doaj +1 more source
Some security issues for web based frameworks [PDF]
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core +1 more source
Secure sessions for web services [PDF]
We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is rather inefficient; moreover, it is often ...
Bhargavan, Karthikeyan +3 more
openaire +3 more sources
Validating a Web Service Security Abstraction by Typing [PDF]
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core +2 more sources
Protecting web services with service oriented traceback architecture [PDF]
Service oriented architecture (SOA) is a way of reorganizing software infrastructure into a set of service abstracts. In the area of applying SOA to Web service security, there have been some well defined security dimensions.
Chonka, Ashley +2 more
core +2 more sources
SafeWeb: A Middleware for Securing Ruby-Based Web Applications [PDF]
Web applications in many domains such as healthcare and finance must process sensitive data, while complying with legal policies regarding the release of different classes of data to different parties.
A. Chaudhuri +15 more
core +7 more sources
A Security-Oriented Analysis of Web Inclusions in the Italian Public Administration
Modern web sites serve content that browsers fetch automatically from a number of different web servers that may be placed anywhere in the world. Such content is essential for defining the appearance and behavior of a web site and is thus a potential ...
Bartoli A. +4 more
doaj +1 more source

