Results 81 to 90 of about 6,128 (199)

Presentation of a Pattern to Counteract the Attacks of XSS Malware

open access: yesInternational Journal of Computer Applications, 2016
Cross Site programming (XSS) is the script attack in web pages, and it is accounted as one of the most dangerous problems of web applications. The researchers of security have investigated on different problems and they have found that the XSS vulnerability exists in many of known websites.
Nasser Modiri, Abbas Ali
openaire   +1 more source

A multi-agent scanner to detect stored-XSS vulnerabilities [PDF]

open access: yes, 2010
Proceeding of: 2010 International Conference for Internet Technology and Secured Transactions (ICITST), 8 to 11 November 2010 London, England, United KingdomThe cross-site scripting (XSS) has become a common vulnerability of many web sites and web ...
Alcaide Raya, Almudena   +3 more
core   +2 more sources

GMSA: Gathering Multiple Signatures Approach to Defend Against Code Injection Attacks

open access: yesIEEE Access, 2018
Code injection attacks (CIAs) exploit security vulnerabilities and computer bugs that are caused by processing invalid codes. CIA is a problem which hackers attempt to introduce to any new method, their objective being to bypass the protection system. In
Hussein Alnabulsi   +2 more
doaj   +1 more source

DISADVANTAGES PRESENTED BY HTML INLINE FRAMES IN INTEGRATION OF 3rd PARTY CONTENT [PDF]

open access: yes
As new virtual structures emerge, new applications, new widgets, new services become available to embed in websites. One of the preferred solutions for embedding 3rd party content is the HTML Inline Frame or iFrame.
Joița Alin-Cristian
core  

A PU‐learning based approach for cross‐site scripting attacking reality detection

open access: yesIET Networks
Cross‐site scripting (XSS) attack has been one of the most dangerous attacks in cyberspace security. Traditional methods essentially discover XSS attack by detecting malicious payloads in requests, which is unable to distinguish attacking attempts with ...
Wenbo Wang, Peng Yi, Huikai Xu
doaj   +1 more source

An Improved Detection of Cross-Site Scripting (XSS) Attacks Using a Hybrid Approach Combining Convolutional Neural Networks and Support Vector Machine

open access: yesJournal of Cybersecurity and Privacy
Cross-site scripting (XSS) attacks are among the threats facing web security, resulting from the diversity and complexity of HTML formats. Research has shown that some text processing-based methods are limited in their ability to detect this type of ...
Abdissamad Ayoubi   +3 more
doaj   +1 more source

Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System

open access: yesJournal of Computer Networks and Communications, 2018
With improvement in computing and technological advancements, web-based applications are now ubiquitous on the Internet. However, these web applications are becoming prone to vulnerabilities which have led to theft of confidential information, data loss,
Bakare K. Ayeni   +2 more
doaj   +1 more source

Assessment of the web application security effectiveness against various methods of network attacks

open access: yesJournal of Computer Sciences Institute, 2018
The article discusses the issue of the security of Internet applications. The most popular types of attacks and methods of securing web applications against them are discussed. The study conducted the effectiveness of security of web applications.
Mateusz Erbel, Piotr Kopniak
doaj   +1 more source

Behind the Code: Identifying Zero-Day Exploits in WordPress

open access: yesFuture Internet
The rising awareness of cybersecurity among governments and the public underscores the importance of effectively managing security incidents, especially zero-day attacks that exploit previously unknown software vulnerabilities. These zero-day attacks are
Mohamed Azarudheen Mohamed Mohideen   +7 more
doaj   +1 more source

Preventing Cross-Site Scripting Attacks by Combining Classifiers [PDF]

open access: yes
Cross-Site Scripting (XSS) is one of the most popular attacks targeting web applications. Using XSS attackers can obtain sensitive information or obtain unauthorized privileges.
Howe, J. M., Mereani, F.
core  

Home - About - Disclaimer - Privacy