Results 61 to 70 of about 6,128 (199)
XSS-FP: Browser Fingerprinting using HTML Parser Quirks [PDF]
There are many scenarios in which inferring the type of a client browser is desirable, for instance to fight against session stealing. This is known as browser fingerprinting.
Abgrall, Erwan +5 more
core +3 more sources
CO2‐Assisted Catalytic Co‐Pyrolysis of Sewage Sludge and Mixed Plastics in a Fluidized Bed Reactor
Sewage sludge (SS) and waste plastics are abundant waste streams that require effective treatment. Co‐pyrolysis is a promising option that can alleviate disposal burdens while converting these wastes into value‐added, renewable energy products. This study investigated the catalytic co‐pyrolysis of SS, polyethylene (PE), and polypropylene (PP) in a 1 ...
Guan-Bang Chen +2 more
wiley +1 more source
Existing web-based security applications have failed in many situations due to the great intelligence of attackers. Among web applications, Cross-Site Scripting (XSS) is one of the dangerous assaults experienced while modifying an organization's or user ...
Muralitharan Krishnan +3 more
doaj +1 more source
Developing a Secure Cyberphysical System for Altitude Chambers
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre +4 more
wiley +1 more source
Cross-site scripting attacks procedure and Prevention Strategies
Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes ...
Wang Xijun, Zhang Weigang
doaj +1 more source
Resilient Autonomous Control of Distributed Multi-agent Systems in Contested Environments
An autonomous and resilient controller is proposed for leader-follower multi-agent systems under uncertainties and cyber-physical attacks. The leader is assumed non-autonomous with a nonzero control input, which allows changing the team behavior or ...
Modares, Hamidreza, Moghadam, Rohollah
core +1 more source
A Deep Learning Approach Using Optimized LSTM for Anomaly‐Based Network Intrusion Detection
With the exponential rise in cyber threats, anomaly‐based network intrusion detection systems (NIDSs) have become critical for maintaining robust cybersecurity. This article proposes an optimized long short‐term memory (LSTM) deep learning (DL) model specifically designed to detect anomalies in network traffic.
Samia Dardouri, Shikha Binwal
wiley +1 more source
An Automated Cross-site Scripting Loopholes Discovery Model [PDF]
Cross-site Scripting(XSS) attacks pose serious threats to web applications.Before the application is released,detecting them can effectively reduce the risk of vulnerabilities.Aiming at the problems in the current detection of cross-site scripting,such ...
MA Futian,QIAN Xuezhong,SONG Wei
doaj +1 more source
A Comprehensive Survey on LLM‐Based Network Management and Operations
ABSTRACT The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule‐based methods, adopting advanced artificial intelligence (AI)‐driven
Jibum Hong +2 more
wiley +1 more source
Comparative Analysis of Machine Learning Algorithms for Cross-Site Scripting (XSS) Attack Detection
Cross-Site Scripting (XSS) attacks pose a significant cybersecurity threat by exploiting vulnerabilities in web applications to inject malicious scripts, enabling unauthorized access and execution of malicious code.
Khairatun Hisan Hamzah +5 more
doaj +1 more source

