Results 61 to 70 of about 6,128 (199)

XSS-FP: Browser Fingerprinting using HTML Parser Quirks [PDF]

open access: yes, 2012
There are many scenarios in which inferring the type of a client browser is desirable, for instance to fight against session stealing. This is known as browser fingerprinting.
Abgrall, Erwan   +5 more
core   +3 more sources

CO2‐Assisted Catalytic Co‐Pyrolysis of Sewage Sludge and Mixed Plastics in a Fluidized Bed Reactor

open access: yesInternational Journal of Energy Research, Volume 2026, Issue 1, 2026.
Sewage sludge (SS) and waste plastics are abundant waste streams that require effective treatment. Co‐pyrolysis is a promising option that can alleviate disposal burdens while converting these wastes into value‐added, renewable energy products. This study investigated the catalytic co‐pyrolysis of SS, polyethylene (PE), and polypropylene (PP) in a 1 ...
Guan-Bang Chen   +2 more
wiley   +1 more source

Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach

open access: yesDigital Communications and Networks
Existing web-based security applications have failed in many situations due to the great intelligence of attackers. Among web applications, Cross-Site Scripting (XSS) is one of the dangerous assaults experienced while modifying an organization's or user ...
Muralitharan Krishnan   +3 more
doaj   +1 more source

Developing a Secure Cyberphysical System for Altitude Chambers

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre   +4 more
wiley   +1 more source

Cross-site scripting attacks procedure and Prevention Strategies

open access: yesMATEC Web of Conferences, 2016
Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes ...
Wang Xijun, Zhang Weigang
doaj   +1 more source

Resilient Autonomous Control of Distributed Multi-agent Systems in Contested Environments

open access: yes, 2018
An autonomous and resilient controller is proposed for leader-follower multi-agent systems under uncertainties and cyber-physical attacks. The leader is assumed non-autonomous with a nonzero control input, which allows changing the team behavior or ...
Modares, Hamidreza, Moghadam, Rohollah
core   +1 more source

A Deep Learning Approach Using Optimized LSTM for Anomaly‐Based Network Intrusion Detection

open access: yesJournal of Engineering, Volume 2026, Issue 1, 2026.
With the exponential rise in cyber threats, anomaly‐based network intrusion detection systems (NIDSs) have become critical for maintaining robust cybersecurity. This article proposes an optimized long short‐term memory (LSTM) deep learning (DL) model specifically designed to detect anomalies in network traffic.
Samia Dardouri, Shikha Binwal
wiley   +1 more source

An Automated Cross-site Scripting Loopholes Discovery Model [PDF]

open access: yesJisuanji gongcheng, 2018
Cross-site Scripting(XSS) attacks pose serious threats to web applications.Before the application is released,detecting them can effectively reduce the risk of vulnerabilities.Aiming at the problems in the current detection of cross-site scripting,such ...
MA Futian,QIAN Xuezhong,SONG Wei
doaj   +1 more source

A Comprehensive Survey on LLM‐Based Network Management and Operations

open access: yesInternational Journal of Network Management, Volume 35, Issue 6, November/December 2025.
ABSTRACT The growing demands for network capacity and the increasing complexities of modern network environments pose significant challenges for effective network management and operations. In response, network operators and administrators are moving beyond traditional manual and rule‐based methods, adopting advanced artificial intelligence (AI)‐driven
Jibum Hong   +2 more
wiley   +1 more source

Comparative Analysis of Machine Learning Algorithms for Cross-Site Scripting (XSS) Attack Detection

open access: yesJOIV: International Journal on Informatics Visualization
Cross-Site Scripting (XSS) attacks pose a significant cybersecurity threat by exploiting vulnerabilities in web applications to inject malicious scripts, enabling unauthorized access and execution of malicious code.
Khairatun Hisan Hamzah   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy