Structural Learning of Attack Vectors for Generating Mutated XSS Attacks [PDF]
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks.
Yi-Hsun Wang +2 more
doaj +4 more sources
Analysis of Carcass and Meat Characteristics in Breast Muscle Between Hubbard White Broilers and Xueshan Chickens [PDF]
The focus on selecting broilers for rapid growth rates and enhanced breast muscle yield has resulted in a decline in meat quality. The differences in carcass characteristics and meat quality between Hubbard white broilers (HWs, a commercial breed) and ...
Fan Li +9 more
doaj +2 more sources
Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers.
Xuyan Song, Baojiang Cui
exaly +3 more sources
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities
As web applications become more prevalent, web security becomes more and more important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common injection web vulnerability.
Miao Liu, Boyu Zhang, Wenbin Chen
exaly +3 more sources
Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review
Web applications are paramount tools for facilitating services providing in the modern world. Unfortunately, the tremendous growth in the web application usage has resulted in a rise in cyberattacks. Cross-site scripting (XSS) is one of the most frequent
Khairulmizam Samsudin +1 more
exaly +3 more sources
Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads
With the development of internet technology, email has become the formal communication method in modern society. Email often contains a large amount of personal privacy information, possible business agreements, and sensitive attachments, which make ...
Yijia Xu, Peng Jia, Cheng Huang
exaly +3 more sources
Securing web applications against XSS and SQLi attacks using a novel deep learning approach [PDF]
Modern web application development involves handling enormous amounts of sensitive and consequential data. Security is, therefore, a crucial component of developing web applications. A web application's security is concerned with safeguarding the data it
Jaydeep R. Tadhani +4 more
doaj +2 more sources
A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks
As the Internet of Things (IoT) expands rapidly and 5G networks become more widespread, the need for strong cybersecurity measures in IoT systems has become increasingly critical.
Mahmoud Aljamal +2 more
exaly +3 more sources
Activation of X-Succinate Synthases for Fumarate Hydroalkylation Using an In Vitro Activation Method [PDF]
X-succinate synthase enzymes (XSSs) are a class of glycyl radical enzymes (GREs) that play a pivotal role in microbial anaerobic hydrocarbon degradation.
Anshika Vats +6 more
doaj +2 more sources
Facile Recycling of Waste Biomass for Preparation of Hierarchical Porous Carbon with High-Performance Electromagnetic Wave Absorption [PDF]
Hierarchical-porous-structured materials have been widely used in the field of electromagnetic wave (EMW) absorption, playing a critical role in minimizing EMW interference and pollution.
Yihui Zhou +4 more
doaj +2 more sources

