Detecting and preventing cyber insider threats: A survey

L Liu, O De Vel, QL Han, J Zhang… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …

A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems

D Gümüşbaş, T Yıldırım, A Genovese… - IEEE Systems …, 2020 - ieeexplore.ieee.org
This survey presents a comprehensive overview of machine learning methods for
cybersecurity intrusion detection systems, with a specific focus on recent approaches based …

A systematic literature review on the characteristics and effectiveness of web application vulnerability scanners

S Alazmi, DC De Leon - IEEe Access, 2022 - ieeexplore.ieee.org
Web applications have been a significant target for successful security breaches in the last
few years. They are currently secured, as a primary method, by searching for their …

State of the art: Automated black-box web application vulnerability testing

J Bau, E Bursztein, D Gupta… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Black-box web application vulnerability scanners are automated tools that probe web
applications for security vulnerabilities. In order to assess the current state of the art, we …

Digital healthcare-cyberattacks in asian organizations: an analysis of vulnerabilities, risks, nist perspectives, and recommendations

K Kandasamy, S Srinivas, K Achuthan… - IEEE access, 2022 - ieeexplore.ieee.org
Cyberattacks on healthcare institutions are on an upsurge all over the world. Recently, Asian
hospitals have become targets of numerous cyberattacks. While Western countries like the …

Current state of research on cross-site scripting (XSS)–A systematic literature review

I Hydara, ABM Sultan, H Zulzalil… - Information and Software …, 2015 - Elsevier
Context Cross-site scripting (XSS) is a security vulnerability that affects web applications. It
occurs due to improper or lack of sanitization of user inputs. The security vulnerability …

Securing web applications from injection and logic vulnerabilities: Approaches and challenges

G Deepa, PS Thilagam - Information and Software Technology, 2016 - Elsevier
Context: Web applications are trusted by billions of users for performing day-to-day activities.
Accessibility, availability and omnipresence of web applications have made them a prime …

Using web security scanners to detect vulnerabilities in web services

M Vieira, N Antunes, H Madeira - 2009 IEEE/IFIP International …, 2009 - ieeexplore.ieee.org
Although Web services are becoming business-critical components, they are often deployed
with critical software bugs that can be maliciously explored. Web vulnerability scanners …

Mitigating program security vulnerabilities: Approaches and challenges

H Shahriar, M Zulkernine - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Programs are implemented in a variety of languages and contain serious vulnerabilities
which might be exploited to cause security breaches. These vulnerabilities have been …

A survey of detection methods for XSS attacks

U Sarmah, DK Bhattacharyya, JK Kalita - Journal of Network and Computer …, 2018 - Elsevier
Cross-site scripting attack (abbreviated as XSS) is an unremitting problem for the Web
applications since the early 2000s. It is a code injection attack on the client-side where an …