Results 31 to 40 of about 6,128 (199)

Deep-Learning Based Injection Attacks Detection Method for HTTP

open access: yesMathematics, 2022
In the context of the new era of high digitization and informatization, the emergence of the internet and artificial intelligence technologies has profoundly changed people’s lifestyles. The traditional cyber attack detection has become increasingly weak
Chunhui Zhao   +4 more
doaj   +1 more source

A Study on XSS Attacks: Intelligent Detection Methods

open access: yesJournal of Physics: Conference Series, 2021
Abstract Cross-site scripting is one of the standard web application attacks vulnerable to the application layer. The attacker handles malicious scripting for trusted websites and inject the script. There are numerous types of XSS scripting vulnerable to attack websites incredibly open web applications.
V S Stency, N Mohanasundaram
openaire   +1 more source

Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]

open access: yes, 2018
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar   +13 more
core   +2 more sources

A Neutrosophic Approach to Robust Web Security: Mitigating XSS Attacks [PDF]

open access: yesNeutrosophic Sets and Systems
Cross-Site Scripting (XSS) is one of the most grievous vulnerabilities-a pitfall through which web applications are affected. These types of attacks are complex, and the available threat landscape is always changing, making it hard for conventional ...
A. A. Salama   +6 more
doaj   +1 more source

Cross-Site Scripting Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining

open access: yesApplied Sciences, 2020
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li   +3 more
doaj   +1 more source

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

Liquid jet capabilities for ultrafast chemistry at the SwissFEL Alvra instrument

open access: yesJournal of Synchrotron Radiation, EarlyView.
The technical aspects of the Alvra endstation are outlined and its scientific capabilities are demonstrated with commissioning results obtained during the early years of SwissFEL's operation.The Alvra experimental station at the Swiss X‐ray free‐electron laser, SwissFEL, investigates ultrafast dynamics in chemical and biological systems using X‐ray ...
Claudio Cirelli   +9 more
wiley   +1 more source

Forensically-Sound Analysis of Security Risks of using Local Password Managers [PDF]

open access: yes, 2016
Password managers have been developed to address the human challenges associated with password security, i.e., to solve usability issues in a secure way.
Franqueira, Virginia N. L.   +2 more
core   +3 more sources

Unlocking the Bioactivity of Cyperi Rhizoma as a Functional Food: Insights From Culinary Processing and Herb Combinations

open access: yesFood Science &Nutrition, Volume 14, Issue 5, May 2026.
Potential pharmacological activities of Cyperus rotundus L. (CR) when paired with six medicinal and edible herbs, exhibiting beneficial effects in anti‑inflammation, anti‑depression, pain relief, and so on. ABSTRACT Cyperi Rhizoma (CR), a globally invasive weed threatening major crops, paradoxically represents an underutilized resource for sustainable ...
Yuehan Liu   +5 more
wiley   +1 more source

Analysis of Different Types of Network Attacks on the GNS3 Platform

open access: yesSakarya University Journal of Computer and Information Sciences, 2020
In this study, DDoS, SQL injection and XSS attacks that hackers use most in cyber attacks are modeled on GNS3 emulator platform and network security is analyzed.
Burak Bitikçi, Resul Daş
doaj   +1 more source

Home - About - Disclaimer - Privacy