Results 71 to 80 of about 6,128 (199)

Using Lightweight Formal Methods for JavaScript Security [PDF]

open access: yes, 2010
The goal of this work was to apply lightweight formal methods to the study of the security of the JavaScript language. Previous work has shown that lightweight formal methods present a new approach to the study of security in the context of the Java ...
Reynolds, Mark
core   +1 more source

Knowledge and Concerns About Smoking‐Related Health Risks: A Cross‐Sectional Analysis of the 2021 International Tobacco Control Japan and Korea Surveys

open access: yesDrug and Alcohol Review, Volume 44, Issue 7, Page 2127-2137, November 2025.
ABSTRACT Introduction This cross‐sectional study examined: (i) knowledge of smoking‐related health risks among adults who currently and formerly smoke; (ii) concerns about personal health damage from smoking among adults who currently smoke; (iii) sociodemographic predictors of knowledge; and (iv) associations between knowledge and concerns in Japan ...
Tianze Sun   +20 more
wiley   +1 more source

Efficient Detection of XSS and DDoS Attacks with Bent Functions

open access: yesInformation
In this paper, we investigate the use of Bent functions, particularly the Maiorana–McFarland (M–M) construction, as a nonlinear preprocessing method to enhance machine learning-based detection systems for Distributed Denial of Service (DDoS) and Cross ...
Shahram Miri Kelaniki, Nikos Komninos
doaj   +1 more source

Web Security Detection Tool [PDF]

open access: yes, 2008
According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]
Agashe, Abhishek
core   +1 more source

Automated vulnerability evaluation with large language models and vulnerability ontologies

open access: yesAI Magazine, Volume 46, Issue 3, Fall 2025.
Abstract The National Vulnerability Database (NVD) publishes over a thousand new vulnerabilities monthly, with a projected 25 percent increase in 2024, highlighting the crucial need for rapid vulnerability identification to mitigate cybersecurity attacks and save costs and resources.
Rikhiya Ghosh   +5 more
wiley   +1 more source

MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique

open access: yesIEEE Access, 2019
Dynamic web applications play a vital role in providing resources manipulation and interaction between clients and servers. The features presently supported by browsers have raised business opportunities, by supplying high interactivity in web-based ...
Fawaz Mahiuob Mohammed Mokbal   +5 more
doaj   +1 more source

Adversarial Examples Detection for XSS Attacks Based on Generative Adversarial Networks

open access: yesIEEE Access, 2020
Models based on deep learning are prone to misjudging the results when faced with adversarial examples. In this paper, we propose an MCTS-T algorithm for generating adversarial examples of cross-site scripting (XSS) attacks based on Monte Carlo tree ...
Xueqin Zhang   +4 more
doaj   +1 more source

Characterization of cyantraniliprole resistance in Spodoptera frugiperda: Selection, inheritance pattern, and cross‐resistance to other diamide insecticides

open access: yesPest Management Science, Volume 81, Issue 8, Page 4677-4689, August 2025.
A cyantraniliprole‐resistant strain of Spodoptera frugiperda with I4790K mutation exhibited a resistance ratio of 3414‐fold and high cross‐resistance to other diamide insecticides. Abstract BACKGROUND Cyantraniliprole, a diamide insecticide, is widely used in Brazil to control sucking and defoliating pests, including the fall armyworm (Spodoptera ...
Leonardo V Thiesen   +7 more
wiley   +1 more source

A hybrid of CNN and LSTM methods of XSS Attacks

open access: yes, 2022
Abstract — Cross-site scripting is a common attack on online applications that is vulnerable at the application layer. The attacker injects the script and handles malicious scripts for trusted websites. There are various sorts of XSS scripts that can be used to target extremely open websites and online apps.
Sruthy Varghese, Lisha Varghese
openaire   +2 more sources

Ultrahigh Conductive MXene Films for Broadband Electromagnetic Interference Shielding

open access: yesAdvanced Materials, Volume 37, Issue 27, July 10, 2025.
A new series of nitrogen‐substituted MXene films, spanning the full composition range, achieves record‐high conductivity (35 000 S cm⁻¹) and outstanding electromagnetic interference (EMI) shielding across X, Ka, and W bands, even in ultrathin layers.
Ju‐Hyoung Han   +14 more
wiley   +1 more source

Home - About - Disclaimer - Privacy