Results 1 to 10 of about 18,778 (174)

Structural Learning of Attack Vectors for Generating Mutated XSS Attacks [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2010
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks.
Yi-Hsun Wang   +2 more
doaj   +4 more sources

Analysis of Carcass and Meat Characteristics in Breast Muscle Between Hubbard White Broilers and Xueshan Chickens [PDF]

open access: yesAnimals
The focus on selecting broilers for rapid growth rates and enhanced breast muscle yield has resulted in a decline in meat quality. The differences in carcass characteristics and meat quality between Hubbard white broilers (HWs, a commercial breed) and ...
Fan Li   +9 more
doaj   +2 more sources

Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities

open access: yesApplied Sciences (Switzerland), 2023
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers.
Xuyan Song, Baojiang Cui
exaly   +3 more sources

A Survey of Exploitation and Detection Methods of XSS Vulnerabilities

open access: yesIEEE Access, 2019
As web applications become more prevalent, web security becomes more and more important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common injection web vulnerability.
Miao Liu, Boyu Zhang, Wenbin Chen
exaly   +3 more sources

Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review

open access: yesJournal of King Saud University - Computer and Information Sciences, 2023
Web applications are paramount tools for facilitating services providing in the modern world. Unfortunately, the tremendous growth in the web application usage has resulted in a rise in cyberattacks. Cross-site scripting (XSS) is one of the most frequent
Khairulmizam Samsudin   +1 more
exaly   +3 more sources

Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads

open access: yesApplied Sciences (Switzerland), 2020
With the development of internet technology, email has become the formal communication method in modern society. Email often contains a large amount of personal privacy information, possible business agreements, and sensitive attachments, which make ...
Yijia Xu, Peng Jia, Cheng Huang
exaly   +3 more sources

Securing web applications against XSS and SQLi attacks using a novel deep learning approach [PDF]

open access: yesScientific Reports
Modern web application development involves handling enormous amounts of sensitive and consequential data. Security is, therefore, a crucial component of developing web applications. A web application's security is concerned with safeguarding the data it
Jaydeep R. Tadhani   +4 more
doaj   +2 more sources

A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks

open access: yesFuture Internet
As the Internet of Things (IoT) expands rapidly and 5G networks become more widespread, the need for strong cybersecurity measures in IoT systems has become increasingly critical.
Mahmoud Aljamal   +2 more
exaly   +3 more sources

Activation of X-Succinate Synthases for Fumarate Hydroalkylation Using an In Vitro Activation Method [PDF]

open access: yesBio-Protocol
X-succinate synthase enzymes (XSSs) are a class of glycyl radical enzymes (GREs) that play a pivotal role in microbial anaerobic hydrocarbon degradation.
Anshika Vats   +6 more
doaj   +2 more sources

Facile Recycling of Waste Biomass for Preparation of Hierarchical Porous Carbon with High-Performance Electromagnetic Wave Absorption [PDF]

open access: yesMolecules
Hierarchical-porous-structured materials have been widely used in the field of electromagnetic wave (EMW) absorption, playing a critical role in minimizing EMW interference and pollution.
Yihui Zhou   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy