Results 71 to 80 of about 6,128 (199)
Using Lightweight Formal Methods for JavaScript Security [PDF]
The goal of this work was to apply lightweight formal methods to the study of the security of the JavaScript language. Previous work has shown that lightweight formal methods present a new approach to the study of security in the context of the Java ...
Reynolds, Mark
core +1 more source
ABSTRACT Introduction This cross‐sectional study examined: (i) knowledge of smoking‐related health risks among adults who currently and formerly smoke; (ii) concerns about personal health damage from smoking among adults who currently smoke; (iii) sociodemographic predictors of knowledge; and (iv) associations between knowledge and concerns in Japan ...
Tianze Sun +20 more
wiley +1 more source
Efficient Detection of XSS and DDoS Attacks with Bent Functions
In this paper, we investigate the use of Bent functions, particularly the Maiorana–McFarland (M–M) construction, as a nonlinear preprocessing method to enhance machine learning-based detection systems for Distributed Denial of Service (DDoS) and Cross ...
Shahram Miri Kelaniki, Nikos Komninos
doaj +1 more source
Web Security Detection Tool [PDF]
According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]
Agashe, Abhishek
core +1 more source
Automated vulnerability evaluation with large language models and vulnerability ontologies
Abstract The National Vulnerability Database (NVD) publishes over a thousand new vulnerabilities monthly, with a projected 25 percent increase in 2024, highlighting the crucial need for rapid vulnerability identification to mitigate cybersecurity attacks and save costs and resources.
Rikhiya Ghosh +5 more
wiley +1 more source
Dynamic web applications play a vital role in providing resources manipulation and interaction between clients and servers. The features presently supported by browsers have raised business opportunities, by supplying high interactivity in web-based ...
Fawaz Mahiuob Mohammed Mokbal +5 more
doaj +1 more source
Adversarial Examples Detection for XSS Attacks Based on Generative Adversarial Networks
Models based on deep learning are prone to misjudging the results when faced with adversarial examples. In this paper, we propose an MCTS-T algorithm for generating adversarial examples of cross-site scripting (XSS) attacks based on Monte Carlo tree ...
Xueqin Zhang +4 more
doaj +1 more source
A cyantraniliprole‐resistant strain of Spodoptera frugiperda with I4790K mutation exhibited a resistance ratio of 3414‐fold and high cross‐resistance to other diamide insecticides. Abstract BACKGROUND Cyantraniliprole, a diamide insecticide, is widely used in Brazil to control sucking and defoliating pests, including the fall armyworm (Spodoptera ...
Leonardo V Thiesen +7 more
wiley +1 more source
A hybrid of CNN and LSTM methods of XSS Attacks
Abstract — Cross-site scripting is a common attack on online applications that is vulnerable at the application layer. The attacker injects the script and handles malicious scripts for trusted websites. There are various sorts of XSS scripts that can be used to target extremely open websites and online apps.
Sruthy Varghese, Lisha Varghese
openaire +2 more sources
Ultrahigh Conductive MXene Films for Broadband Electromagnetic Interference Shielding
A new series of nitrogen‐substituted MXene films, spanning the full composition range, achieves record‐high conductivity (35 000 S cm⁻¹) and outstanding electromagnetic interference (EMI) shielding across X, Ka, and W bands, even in ultrathin layers.
Ju‐Hyoung Han +14 more
wiley +1 more source

