Results 161 to 170 of about 6,128 (199)
Some of the next articles are maybe not open access.
Cross Site Scripting Attacks (XSS): A Review
Lecture Notes in Networks and SystemsIman Fareed Khazal +2 more
exaly +2 more sources
Information Theoretic XSS Attack Detection in Web Applications
International Journal of Secure Software Engineering, 2014Cross-Site Scripting (XSS) has been ranked among the top three vulnerabilities over the last few years. XSS vulnerability allows an attacker to inject arbitrary JavaScript code that can be executed in the victim's browser to cause unwanted behaviors and security breaches. Despite the presence of many mitigation approaches, the discovery of XSS is still
Shahriar, Hossain +3 more
openaire +2 more sources
The generation of XSS attacks developing in the detect detection
2016In recent years, the web security events emerge in endlessly, web security has been widely concerned. Cross-site scripting (XSS) attack is one of the most foremost threats which using malicious scripts injected into Web applications and executing the scripts in the client browsers.
Baojiang Cui +3 more
openaire +1 more source
XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks
One of the most common application layer attacks which also involves cloud systems is called Cross-Site Scripting (XSS), and Those attacks link a victim to the internet by stealing their cookies and other private information. XSS attacks are in the third place the OWASP Top10 of most critical web application threats, and the literature shows a number ...Davide Alfieri +3 more
openaire +2 more sources
XSS Vulnerability Detection Using Optimized Attack Vector Repertory
2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015In order to detect the Cross-Site Script (XSS)vulnerabilities in the web applications, this paper proposes a method of XSS vulnerability detection using optimal attack vector repertory. This method generates an attack vector repertory automatically, optimizes the attack vector repertory using an optimization model, and detects XSS vulnerabilities in ...
Xiaobing Guo, Shuyuan Jin, Yaxing Zhang
openaire +1 more source
SECSIX: security engine for CSRF, SQL injection and XSS attacks
International Journal of System Assurance Engineering and Management, 2016With the increase in human-web interaction, vulnerabilities has surfaced the various networks. With the rapidly growing technology, the ease of accessibility through web applications has revolutionized the traditional view of an office or a company completely. Web application carries sensitive data and they are accessible 24 × 7.
Bharti Nagpal +2 more
openaire +1 more source
A system for redicting SQLi and XSS Attacks
2021 International Conference on Information Security and Cryptology (ISCTURKEY), 2021Mehmet Serhan Ercin, Esra Nergis Yolacan
openaire +1 more source
XSS pattern for attack modeling in testing
2013 8th International Workshop on Automation of Software Test (AST), 2013Josip Bozic, Franz Wotawa
openaire +1 more source
Automatic Examination-Based Whitelist Generation for XSS Attack Detection
2018When faced with cross-site scripting (XSS) attacks, it is difficult to counter all malicious inputs such that they are rendered completely harmless. In such situations, the introduction of a whitelist-based XSS countermeasure is considered to be an effective and robust approach.
Keisuke Inoue +4 more
openaire +1 more source
An Unsupervised Method for Detection of XSS Attack. [PDF]
Swaswati Goswami +3 more
openaire

