Results 91 to 100 of about 6,128 (199)

Unveiling XSS Threats: A Bipartite Graph Approach with Ensemble Deep Learning for Enhanced Detection

open access: yesInformation
Cross-Site Scripting (XSS) attacks are a common source of vulnerability for web applications, necessitating scalable mechanisms for detection. In this work, a new method based on bipartite graph-based feature extraction and an ensemble learning ...
Wafa Alorainy
doaj   +1 more source

Prevention of XSS attacks using STCD

open access: yesACM SIGSOFT Software Engineering Notes, 2012
Variability (the ability of a software system or software artifact to be adapted for use in a specific context) is reflected in and facilitated through the software architecture. The Second International Workshop on Variability in Software Architecture (VARSA) was held in conjunction with the Joint 10th Working IEEE/IFIP Conference on Software ...
Siva Brahmasani   +2 more
openaire   +2 more sources

XSShield: A novel dataset and lightweight hybrid deep learning model for XSS attack detection

open access: yesResults in Engineering
With the proliferation of web applications, cross-site scripting (XSS) attacks have increased significantly and now pose a significant threat to users' information security and privacy.
Gia-Huy Luu   +6 more
doaj   +1 more source

Machine Learning-Driven Detection of Cross-Site Scripting Attacks

open access: yesInformation
The ever-growing web application landscape, fueled by technological advancements, introduces new vulnerabilities to cyberattacks. Cross-site scripting (XSS) attacks pose a significant threat, exploiting the difficulty of distinguishing between benign and
Rahmah Alhamyani, Majid Alshammari
doaj   +1 more source

Website Penetration Analysis Against XSS Attacks using Payload Method

open access: yesJournal of Innovation Information Technology and Application
This research aims to analyze the effectiveness of various penetration testing methods in identifying and mitigating XSS (Cross-Site Scripting) vulnerabilities in web applications.
Luthfi Arian Nugraha
doaj   +1 more source

INFO2009 - Team 'DROP TABLE groups; [PDF]

open access: yes
Edshare for INFO2009 coursework 2 - Team 'DROP TABLE ...
Bull, Samuel   +5 more
core  

INVESTIGATION OF NEURAL NETWORK ALGORITHM FOR DETECTION OF NETWORK HOST ANOMALIES IN THE AUTOMATED SEARCH FOR XSS VULNERABILITIES AND SQL INJECTIONS [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2016
A problem of aberrant behavior detection for network communicating computer is discussed. A novel approach based on dynamic response of computer is introduced. The computer is suggested as a multiple-input multiple-output (MIMO) plant.
Y. D. Shabalin, V. L. Eliseev
doaj  

Analysis of current threats and security measures used in web applications on the example of Symfony, Express, and Spring Boot

open access: yesJournal of Computer Sciences Institute
The article analyzes the most common threats currently appearing in web applications and compares the built-in security features of Symfony, Express, and Spring Boot frameworks.
Karol Kurowski, Magdalena Kramek
doaj   +1 more source

Detection of the Security Vulnerabilities in Web Applications [PDF]

open access: yes
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect.
Marius POPA
core  

DETECTION AND AVOIDANCE OF INPUT VALIDATION ATTACKS IN WEB APPLICATION USING DETERMINISTIC PUSH DOWN AUTOMATA

open access: yesМіжнародний науково-технічний журнал "Проблеми керування та інформатики"
The proper validation of input and sanitization is critical issue in developing web applications. Errors and flaws in validation operations resulting in malicious behavior in web application can be easily exploited by attackers.
В. Нитья   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy