Results 91 to 100 of about 6,128 (199)
Unveiling XSS Threats: A Bipartite Graph Approach with Ensemble Deep Learning for Enhanced Detection
Cross-Site Scripting (XSS) attacks are a common source of vulnerability for web applications, necessitating scalable mechanisms for detection. In this work, a new method based on bipartite graph-based feature extraction and an ensemble learning ...
Wafa Alorainy
doaj +1 more source
Prevention of XSS attacks using STCD
Variability (the ability of a software system or software artifact to be adapted for use in a specific context) is reflected in and facilitated through the software architecture. The Second International Workshop on Variability in Software Architecture (VARSA) was held in conjunction with the Joint 10th Working IEEE/IFIP Conference on Software ...
Siva Brahmasani +2 more
openaire +2 more sources
XSShield: A novel dataset and lightweight hybrid deep learning model for XSS attack detection
With the proliferation of web applications, cross-site scripting (XSS) attacks have increased significantly and now pose a significant threat to users' information security and privacy.
Gia-Huy Luu +6 more
doaj +1 more source
Machine Learning-Driven Detection of Cross-Site Scripting Attacks
The ever-growing web application landscape, fueled by technological advancements, introduces new vulnerabilities to cyberattacks. Cross-site scripting (XSS) attacks pose a significant threat, exploiting the difficulty of distinguishing between benign and
Rahmah Alhamyani, Majid Alshammari
doaj +1 more source
Website Penetration Analysis Against XSS Attacks using Payload Method
This research aims to analyze the effectiveness of various penetration testing methods in identifying and mitigating XSS (Cross-Site Scripting) vulnerabilities in web applications.
Luthfi Arian Nugraha
doaj +1 more source
INFO2009 - Team 'DROP TABLE groups; [PDF]
Edshare for INFO2009 coursework 2 - Team 'DROP TABLE ...
Bull, Samuel +5 more
core
INVESTIGATION OF NEURAL NETWORK ALGORITHM FOR DETECTION OF NETWORK HOST ANOMALIES IN THE AUTOMATED SEARCH FOR XSS VULNERABILITIES AND SQL INJECTIONS [PDF]
A problem of aberrant behavior detection for network communicating computer is discussed. A novel approach based on dynamic response of computer is introduced. The computer is suggested as a multiple-input multiple-output (MIMO) plant.
Y. D. Shabalin, V. L. Eliseev
doaj
The article analyzes the most common threats currently appearing in web applications and compares the built-in security features of Symfony, Express, and Spring Boot frameworks.
Karol Kurowski, Magdalena Kramek
doaj +1 more source
Detection of the Security Vulnerabilities in Web Applications [PDF]
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect.
Marius POPA
core
The proper validation of input and sanitization is critical issue in developing web applications. Errors and flaws in validation operations resulting in malicious behavior in web application can be easily exploited by attackers.
В. Нитья +1 more
doaj +1 more source

