Results 21 to 30 of about 6,128 (199)
An LSTM based cross-site scripting attack detection scheme for Cloud Computing environments
Cloud Computing plays a pivotal role in facilitating the Internet of Things (IoT) and its diverse applications. Users frequently access and store data on remote servers in Cloud Computing environments through web browsers.
Xiaolong Li +7 more
doaj +1 more source
Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review
Web applications are paramount tools for facilitating services providing in the modern world. Unfortunately, the tremendous growth in the web application usage has resulted in a rise in cyberattacks. Cross-site scripting (XSS) is one of the most frequent
Isam Kareem Thajeel +3 more
doaj +1 more source
Some security issues for web based frameworks [PDF]
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core +1 more source
Structured Query Language (SQL) injection and cross-site scripting remain a major threat to data-driven web applications. Instances where hackers obtain unrestricted access to back-end database of web applications so as to steal, edit, and destroy ...
Oluwakemi Christiana Abikoye +4 more
doaj +1 more source
Detection of Reflected XSS Vulnerabilities Based on Paths-Attention Method
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these ...
Xiaobo Tan +3 more
doaj +1 more source
X-Secure:protecting users from big bad wolves [PDF]
In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity.
Bellekens, Xavier +3 more
core +3 more sources
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations [PDF]
Many millions of users routinely use their Google, Facebook and Microsoft accounts to log in to websites supporting OAuth 2.0-based single sign on. The security of OAuth 2.0 is therefore of critical importance, and it has been widely examined both in ...
C Bansal, DL Dill, E Shernan, W Li, W Li
core +2 more sources
SWAP: Mitigating XSS attacks using a reverse proxy [PDF]
Due to the increasing amount of Web sites offering features to contribute rich content, and the frequent failure of Web developers to properly sanitize user input, cross-site scripting prevails as the most significant security threat to Web applications.
Peter Würzinger +4 more
openaire +1 more source
CODDLE: Code-Injection Detection With Deep Learning
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today's web applications and systems. This paper proposes CODDLE, a deep learning-based intrusion detection systems against web-based code ...
Stanislav Abaimov, Giuseppe Bianchi
doaj +1 more source
How to design browser security and privacy alerts [PDF]
Browser security and privacy alerts must be designed to ensure they are of value to the end-user, and communicate risks efficiently. We performed a systematic literature review, producing a list of guidelines from the research.
Renaud, Karen, Shepherd, Lynsay
core +6 more sources

