Results 51 to 60 of about 6,128 (199)
XSS Attack Detection Method Based on CNN-BiLSTM-Attention
Cross-site scripting (XSS) is one of the most common security threats to web applications, posing a serious challenge to network information security. Targetting the limitations of traditional detection methods in identifying complex XSS attacks, this ...
Zhiping Li +3 more
doaj +1 more source
Automated and Explainable Denial of Service Analysis for AI‐Driven Intrusion Detection Systems
With the increasing frequency and sophistication of distributed denial of service (DDoS) attacks, it has become critical to develop more efficient and interpretable detection methods. Traditional detection systems often struggle with scalability and transparency, hindering real‐time response and understanding of attack vectors. This article presents an
Paul Badu Yakubu +6 more
wiley +1 more source
Analysis strategies for time‐resolved X‐ray solution scattering at high repetition rate XFEL sources
An analysis of experimental artifacts in time‐resolved X‐ray solution scattering data acquired at high repetition rate XFEL sources, specifically at the FXE instrument at the European XFEL, is presented.With the start of the user program at the European XFEL in 2017, and more recently with the LCLS‐II upgrade, the X‐ray repetition rate at X‐ray free ...
Morten Lunn Haubro +27 more
wiley +1 more source
Policy-agnostic programming on the client-side [PDF]
Browser security has become a major concern especially due to web pages becoming more complex. These web applications handle a lot of information, including sensitive data that may be vulnerable to attacks like data exfiltration, cross-site scripting ...
Palesha, Kushal
core +1 more source
Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces
Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure.
Costin, Andrei +2 more
core +2 more sources
Detection of APTs by Machine Learning: A Performance Comparison
ABSTRACT Recent advances in machine learning and deep learning have significantly impacted multiple domains, including computer vision, natural language processing and cybersecurity. In the context of increasingly sophisticated Advanced Persistent Threats (APTs), deep learning models have shown strong potential for network intrusion detection by ...
Marcos Luengo Viñuela +5 more
wiley +1 more source
METHODS OF BLOCKING THE VULNERABILITIES OF THE XSS TYPE BASED ON SERVICE-ORIENTED ARCHITECTURE
Web applications are developed in several languages and deployed in various operating systems. This is due to the various functions that the web application provides to its users.
Р.Х. Хамдамов +1 more
doaj +1 more source
E-commerce that is growing so rapidly can provide space for unauthorized parties in carrying out cybercrime, security anticipation is needed so that e-commerce applications can be protected from harassment or hacking attacks such as cross-site scripting (
Imam Riadi, Rusydi Umar, Tri Lestari
doaj +1 more source
Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa +5 more
wiley +1 more source
With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there is a
Yong Fang +3 more
doaj +1 more source

