Results 51 to 60 of about 6,128 (199)

XSS Attack Detection Method Based on CNN-BiLSTM-Attention

open access: yesApplied Sciences
Cross-site scripting (XSS) is one of the most common security threats to web applications, posing a serious challenge to network information security. Targetting the limitations of traditional detection methods in identifying complex XSS attacks, this ...
Zhiping Li   +3 more
doaj   +1 more source

Automated and Explainable Denial of Service Analysis for AI‐Driven Intrusion Detection Systems

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
With the increasing frequency and sophistication of distributed denial of service (DDoS) attacks, it has become critical to develop more efficient and interpretable detection methods. Traditional detection systems often struggle with scalability and transparency, hindering real‐time response and understanding of attack vectors. This article presents an
Paul Badu Yakubu   +6 more
wiley   +1 more source

Analysis strategies for time‐resolved X‐ray solution scattering at high repetition rate XFEL sources

open access: yesJournal of Synchrotron Radiation, Volume 33, Issue 1, Page 18-31, January 2026.
An analysis of experimental artifacts in time‐resolved X‐ray solution scattering data acquired at high repetition rate XFEL sources, specifically at the FXE instrument at the European XFEL, is presented.With the start of the user program at the European XFEL in 2017, and more recently with the LCLS‐II upgrade, the X‐ray repetition rate at X‐ray free ...
Morten Lunn Haubro   +27 more
wiley   +1 more source

Policy-agnostic programming on the client-side [PDF]

open access: yes, 2017
Browser security has become a major concern especially due to web pages becoming more complex. These web applications handle a lot of information, including sensitive data that may be vulnerable to attacks like data exfiltration, cross-site scripting ...
Palesha, Kushal
core   +1 more source

Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces

open access: yes, 2015
Embedded devices are becoming more widespread, interconnected, and web-enabled than ever. However, recent studies showed that these devices are far from being secure.
Costin, Andrei   +2 more
core   +2 more sources

Detection of APTs by Machine Learning: A Performance Comparison

open access: yesExpert Systems, Volume 43, Issue 1, January 2026.
ABSTRACT Recent advances in machine learning and deep learning have significantly impacted multiple domains, including computer vision, natural language processing and cybersecurity. In the context of increasingly sophisticated Advanced Persistent Threats (APTs), deep learning models have shown strong potential for network intrusion detection by ...
Marcos Luengo Viñuela   +5 more
wiley   +1 more source

METHODS OF BLOCKING THE VULNERABILITIES OF THE XSS TYPE BASED ON SERVICE-ORIENTED ARCHITECTURE

open access: yesМіжнародний науково-технічний журнал "Проблеми керування та інформатики"
Web applications are developed in several languages and deployed in various operating systems. This is due to the various functions that the web application provides to its users.
Р.Х. Хамдамов   +1 more
doaj   +1 more source

Analisis Kerentanan Serangan Cross Site Scripting (XSS) pada Aplikasi Smart Payment Menggunakan Framework OWASP

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2020
E-commerce that is growing so rapidly can provide space for unauthorized parties in carrying out cybercrime, security anticipation is needed so that e-commerce applications can be protected from harassment or hacking attacks such as cross-site scripting (
Imam Riadi, Rusydi Umar, Tri Lestari
doaj   +1 more source

Lightweight Deep Learning Approach for Intelligent Intrusion Detection in IoT Networks

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
Intrusion detection system (IDS) is designed to analyze and monitor the network traffic to identify unauthorized access or attacks in an Internet of Things (IoT). IDS assists in protecting IoT devices and networks by recognizing malicious activities and preventing potential breaches.
Srikanth Mudiyanuru Sriramappa   +5 more
wiley   +1 more source

RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning

open access: yesFuture Internet, 2019
With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there is a
Yong Fang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy