Results 41 to 50 of about 18,797 (191)
Summary: Anaerobic microbial degradation of hydrocarbons is often initiated through addition of the hydrocarbon to fumarate by enzymes known as X-succinate synthases (XSSs).
Mary C. Andorfer +4 more
doaj +1 more source
Statically Identifying XSS using Deep Learning
Cross-site Scripting (XSS) is ranked first in the top 25 Most Dangerous Software Weaknesses (2020) of Common Weakness Enumeration (CWE) and places this vulnerability as the most dangerous among programming errors. In this work, we explore static approaches to detect XSS vulnerabilities using neural networks.
Héloïse Maurel +2 more
openaire +4 more sources
Enhancing Security of Web-Based IoT Services via XSS Vulnerability Detection
The Internet of Things (IoT) technology is experiencing significant growth and integration into various aspects of daily life. With the rising number of connected devices, diverse security challenges are emerging as substantial threats to IoT. Cross-Site
Jemin Kim, Joonseok Park
doaj +1 more source
Automatic Creation of SQL Injection and Cross-Site Scripting Attacks [PDF]
We present a technique for finding security vulnerabilitiesin Web applications. SQL Injection (SQLI) and cross-sitescripting (XSS) attacks are widespread forms of attackin which the attacker crafts the input to the application toaccess or modify user ...
Ernst, Michael D. +3 more
core +5 more sources
Towards non-reductive geometric invariant theory
We study linear actions of algebraic groups on smooth projective varieties X. A guiding goal for us is to understand the cohomology of "quotients" under such actions, by generalizing (from reductive to non-reductive group actions) existing methods ...
Doran, Brent, Kirwan, Frances
core +2 more sources
Current state of research on cross-site scripting (XSS) – a systematic literature review [PDF]
Context: Cross-site scripting (XSS) is a security vulnerability that affects web applications. It occurs due to improper or lack of sanitization of user inputs. The security vulnerability caused many problems for users and server applications. Objective:
Admodisastro , Novia Indriaty +3 more
core +1 more source
Abstract Background Optimal outcomes from subthalamic nucleus deep brain stimulation (STN‐DBS) for Parkinson's disease (PD) depend on accurate stimulation of an ideal functional target within the dorsolateral STN. Clinical programming is heuristic, and objective methods are needed to improve efficiency and consistency.
Kanae J. Nagao +9 more
wiley +1 more source
Enterprise Network Security Using Few‐Shot Meta‐Learning
This paper involves a few‐shot learning study that uses model‐agnostic meta‐learning. A meta‐dataset was curated by combining six benchmark network intrusion detection datasets by parsing network traffic data from PCAP files. An MAML model performs meta‐training, validation and meta‐testing before and after fine‐tuning.
Sushant Jain +4 more
wiley +1 more source
Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro
The security aspect is often forgotten in the application of Information Technology. The attacks were caused by the negligence of the developer causes damage to the system used. SQL Injection attacks, Cross Site Scripting attacks, and no use of encrypted
Hilal Afrih Juhad +2 more
doaj +1 more source
Background Bacterial blight of cotton (BBC), which is caused by the bacterium Xanthomonas citri pv. malvacearum (Xcm), is a destructive disease in cotton.
Fazal Haq +11 more
doaj +1 more source

