Results 31 to 40 of about 6,128 (199)
Deep-Learning Based Injection Attacks Detection Method for HTTP
In the context of the new era of high digitization and informatization, the emergence of the internet and artificial intelligence technologies has profoundly changed people’s lifestyles. The traditional cyber attack detection has become increasingly weak
Chunhui Zhao +4 more
doaj +1 more source
A Study on XSS Attacks: Intelligent Detection Methods
Abstract Cross-site scripting is one of the standard web application attacks vulnerable to the application layer. The attacker handles malicious scripting for trusted websites and inject the script. There are numerous types of XSS scripting vulnerable to attack websites incredibly open web applications.
V S Stency, N Mohanasundaram
openaire +1 more source
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar +13 more
core +2 more sources
A Neutrosophic Approach to Robust Web Security: Mitigating XSS Attacks [PDF]
Cross-Site Scripting (XSS) is one of the most grievous vulnerabilities-a pitfall through which web applications are affected. These types of attacks are complex, and the available threat landscape is always changing, making it hard for conventional ...
A. A. Salama +6 more
doaj +1 more source
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li +3 more
doaj +1 more source
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana +2 more
core +1 more source
Liquid jet capabilities for ultrafast chemistry at the SwissFEL Alvra instrument
The technical aspects of the Alvra endstation are outlined and its scientific capabilities are demonstrated with commissioning results obtained during the early years of SwissFEL's operation.The Alvra experimental station at the Swiss X‐ray free‐electron laser, SwissFEL, investigates ultrafast dynamics in chemical and biological systems using X‐ray ...
Claudio Cirelli +9 more
wiley +1 more source
Forensically-Sound Analysis of Security Risks of using Local Password Managers [PDF]
Password managers have been developed to address the human challenges associated with password security, i.e., to solve usability issues in a secure way.
Franqueira, Virginia N. L. +2 more
core +3 more sources
Potential pharmacological activities of Cyperus rotundus L. (CR) when paired with six medicinal and edible herbs, exhibiting beneficial effects in anti‑inflammation, anti‑depression, pain relief, and so on. ABSTRACT Cyperi Rhizoma (CR), a globally invasive weed threatening major crops, paradoxically represents an underutilized resource for sustainable ...
Yuehan Liu +5 more
wiley +1 more source
Analysis of Different Types of Network Attacks on the GNS3 Platform
In this study, DDoS, SQL injection and XSS attacks that hackers use most in cyber attacks are modeled on GNS3 emulator platform and network security is analyzed.
Burak Bitikçi, Resul Daş
doaj +1 more source

