Results 21 to 30 of about 6,128 (199)

An LSTM based cross-site scripting attack detection scheme for Cloud Computing environments

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
Cloud Computing plays a pivotal role in facilitating the Internet of Things (IoT) and its diverse applications. Users frequently access and store data on remote servers in Cloud Computing environments through web browsers.
Xiaolong Li   +7 more
doaj   +1 more source

Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Web applications are paramount tools for facilitating services providing in the modern world. Unfortunately, the tremendous growth in the web application usage has resulted in a rise in cyberattacks. Cross-site scripting (XSS) is one of the most frequent
Isam Kareem Thajeel   +3 more
doaj   +1 more source

Some security issues for web based frameworks [PDF]

open access: yes, 2010
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core   +1 more source

A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm

open access: yesEURASIP Journal on Information Security, 2020
Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy ...
Oluwakemi Christiana Abikoye   +4 more
doaj   +1 more source

Detection of Reflected XSS Vulnerabilities Based on Paths-Attention Method

open access: yesApplied Sciences, 2023
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these ...
Xiaobo Tan   +3 more
doaj   +1 more source

X-Secure:protecting users from big bad wolves [PDF]

open access: yes, 2016
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity.
Bellekens, Xavier   +3 more
core   +3 more sources

Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations [PDF]

open access: yes, 2018
Many millions of users routinely use their Google, Facebook and Microsoft accounts to log in to websites supporting OAuth 2.0-based single sign on. The security of OAuth 2.0 is therefore of critical importance, and it has been widely examined both in ...
C Bansal, DL Dill, E Shernan, W Li, W Li
core   +2 more sources

SWAP: Mitigating XSS attacks using a reverse proxy [PDF]

open access: yes2009 ICSE Workshop on Software Engineering for Secure Systems, 2009
Due to the increasing amount of Web sites offering features to contribute rich content, and the frequent failure of Web developers to properly sanitize user input, cross-site scripting prevails as the most significant security threat to Web applications.
Peter Würzinger   +4 more
openaire   +1 more source

CODDLE: Code-Injection Detection With Deep Learning

open access: yesIEEE Access, 2019
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj   +1 more source

How to design browser security and privacy alerts [PDF]

open access: yes, 2018
Browser security and privacy alerts must be designed to ensure they are of value to the end-user, and communicate risks efficiently. We performed a systematic literature review, producing a list of guidelines from the research.
Renaud, Karen, Shepherd, Lynsay
core   +6 more sources

Home - About - Disclaimer - Privacy