Results 11 to 20 of about 18,797 (191)

Atomically Resolved Acoustic Dynamics Coupled with Magnetic Order in a Van der Waals Antiferromagnet. [PDF]

open access: yesAdv Mater
Magnetically coupled acoustic phonon modes (f1, f2, f3) are captured by ultrafast X‐ray diffraction in a prototypical van der Waals antiferromagnet FePS3, including their atomic displacement vectors (u) and the acoustic propagation wave vectors (k). Notably, the atomic displacement vector and amplitude of these modes, represented by the direction and ...
Zhou F   +24 more
europepmc   +2 more sources

XSShield: A novel dataset and lightweight hybrid deep learning model for XSS attack detection

open access: yesResults in Engineering
With the proliferation of web applications, cross-site scripting (XSS) attacks have increased significantly and now pose a significant threat to users' information security and privacy.
Kim-Hung Le
exaly   +3 more sources

Analysis strategies for time-resolved X-ray solution scattering at high repetition rate XFEL sources. [PDF]

open access: yesJ Synchrotron Radiat
An analysis of experimental artifacts in time‐resolved X‐ray solution scattering data acquired at high repetition rate XFEL sources, specifically at the FXE instrument at the European XFEL, is presented.With the start of the user program at the European XFEL in 2017, and more recently with the LCLS‐II upgrade, the X‐ray repetition rate at X‐ray free ...
Haubro ML   +27 more
europepmc   +2 more sources

Possibilities of conducting XSS-attacks and the development of countermeasures [PDF]

open access: yesE3S Web of Conferences, 2020
The article describes the investigation process of the possibilities of XSS–attacks, and the development of counteraction means to these attacks. Researches were determined whether XSS–attack can be fulfilled successfully, and vulnerability detection ...
Revyakina Yelena   +5 more
doaj   +1 more source

A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Cross-site scripting (XSS) attacks have been extensively studied in the literature, although mitigating such attacks remain a challenge for cyber defenders. In this paper, we survey the existing literature on XSS attacks, focusing on the range of attacks
Dragan Korać   +3 more
doaj   +1 more source

XSS Attack and Countermeasure: Survey [PDF]

open access: yesJournal of Digital Convergence, 2013
Sunghyuck Hong
exaly   +2 more sources

Rule-defect oriented browser XSS filter test method

open access: yes网络与信息安全学报, 2018
In order to alleviate XSS (cross-site scripting) attacks,modern browsers use XSS filters for defense.It is difficult to effectively test and evaluate the security of browser XSS filters.The rule-defect is the defect and security problem in the ...
Zhijie GUI, Hui SHU
doaj   +3 more sources

Математический алгоритм обнаружения XSS-атак на веб-приложения

open access: yesМіжнародний науково-технічний журнал "Проблеми керування та інформатики", 2020
В последнее время атаки на веб-приложения, такие как SQL-инъекции и межсайтовый скриптинг (XSS), имеют тенденцию к увеличению. В статье предложен новый алгоритм обнаружения XSS-атак, построенный на анализе частоты появления специальных символов, а также
Рустам Хамдамович Хамдамов   +1 more
doaj   +1 more source

Cost-effective detection system of cross-site scripting attacks using hybrid learning approach

open access: yesResults in Engineering, 2023
Cross-Site Scripting (XSS) attacks inject malicious code payloads into web application logs, triggering stored cross-site scripting execution when accessing the view-logs interface.
Qasem Abu Al-Haija
doaj   +1 more source

Analysis of Different Types of Network Attacks on the GNS3 Platform

open access: yesSakarya University Journal of Computer and Information Sciences, 2020
In this study, DDoS, SQL injection and XSS attacks that hackers use most in cyber attacks are modeled on GNS3 emulator platform and network security is analyzed.
Burak Bitikçi, Resul Daş
doaj   +1 more source

Home - About - Disclaimer - Privacy