Results 81 to 90 of about 18,797 (191)
CO2‐Assisted Catalytic Co‐Pyrolysis of Sewage Sludge and Mixed Plastics in a Fluidized Bed Reactor
Sewage sludge (SS) and waste plastics are abundant waste streams that require effective treatment. Co‐pyrolysis is a promising option that can alleviate disposal burdens while converting these wastes into value‐added, renewable energy products. This study investigated the catalytic co‐pyrolysis of SS, polyethylene (PE), and polypropylene (PP) in a 1 ...
Guan-Bang Chen +2 more
wiley +1 more source
Developing a Secure Cyberphysical System for Altitude Chambers
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre +4 more
wiley +1 more source
A dynamic detection method based on Web crawler and page code behavior for XSS vulnerability
XSS vulnerability is a common vulnerability of attacking the Web application and getting the user’s privacy data.Traditional XSS vulnerability detection’s softwares aren’t specially detecting for AJAX Web application.There is a huge disparity in the ...
Yi LIU, Junbin HONG
doaj +2 more sources
A Deep Learning Approach Using Optimized LSTM for Anomaly‐Based Network Intrusion Detection
With the exponential rise in cyber threats, anomaly‐based network intrusion detection systems (NIDSs) have become critical for maintaining robust cybersecurity. This article proposes an optimized long short‐term memory (LSTM) deep learning (DL) model specifically designed to detect anomalies in network traffic.
Samia Dardouri, Shikha Binwal
wiley +1 more source
Website Penetration Analysis Against XSS Attacks using Payload Method
This research aims to analyze the effectiveness of various penetration testing methods in identifying and mitigating XSS (Cross-Site Scripting) vulnerabilities in web applications.
Luthfi Arian Nugraha
doaj +1 more source
Application Research of BiLSTM in Cross-Site Scripting Detection
At present, machine learning methods are used in the most traditional cross-site scripting (XSS) detection technologies, which have some defects, such as bad readability because of maliciously confused code, insufficient feature extraction and low ...
CHENG Qiqin, WAN Liang
doaj +1 more source
This page is designed to give an overview of Cross Site Scripting attacks on web sites, how they come into being, how to exploit them and how to protect against them. To fully comprehend Cross Site Scripting, or XSS as it is known (CSS is NOT used as an abbreviation because it causes confusion when talking about Cascading Style Sheets), it is necessary
openaire +2 more sources
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners [PDF]
Black-box vulnerability scanners can miss a non-negligible portion of vulnerabilities. This is true even for cross-site scripting (XSS) vulnerabilities, which are relatively simple to spot. In this paper, we focus on this vulnerability class, and systematically explore 6 black-box scanners to uncover how they detect XSS vulnerabilities, and obtain ...
Bazzoli, Enrico +3 more
openaire +2 more sources
CODDLE: Code-Injection Detection With Deep Learning
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj +1 more source
Crosscan: reflected xss scannera website to scan for reflected xss vulnerabilities.
Cross-Site Scripting (XSS) vulnerabilities are one of the most common security issues in web applications, allowing attackers to inject malicious scripts into web pages viewed by other users. Reflected XSS, a subset of XSS attacks, poses a significant risk as it can be exploited to steal sensitive information, impersonate users, and spread malware ...
Abhishek Prajapati +4 more
openaire +1 more source

