Detecting and preventing cyber insider threats: A survey
Information communications technology systems are facing an increasing number of cyber
security threats, the majority of which are originated by insiders. As insiders reside behind …
security threats, the majority of which are originated by insiders. As insiders reside behind …
A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems
This survey presents a comprehensive overview of machine learning methods for
cybersecurity intrusion detection systems, with a specific focus on recent approaches based …
cybersecurity intrusion detection systems, with a specific focus on recent approaches based …
A systematic literature review on the characteristics and effectiveness of web application vulnerability scanners
S Alazmi, DC De Leon - IEEe Access, 2022 - ieeexplore.ieee.org
Web applications have been a significant target for successful security breaches in the last
few years. They are currently secured, as a primary method, by searching for their …
few years. They are currently secured, as a primary method, by searching for their …
State of the art: Automated black-box web application vulnerability testing
J Bau, E Bursztein, D Gupta… - 2010 IEEE symposium on …, 2010 - ieeexplore.ieee.org
Black-box web application vulnerability scanners are automated tools that probe web
applications for security vulnerabilities. In order to assess the current state of the art, we …
applications for security vulnerabilities. In order to assess the current state of the art, we …
Digital healthcare-cyberattacks in asian organizations: an analysis of vulnerabilities, risks, nist perspectives, and recommendations
K Kandasamy, S Srinivas, K Achuthan… - IEEE access, 2022 - ieeexplore.ieee.org
Cyberattacks on healthcare institutions are on an upsurge all over the world. Recently, Asian
hospitals have become targets of numerous cyberattacks. While Western countries like the …
hospitals have become targets of numerous cyberattacks. While Western countries like the …
Current state of research on cross-site scripting (XSS)–A systematic literature review
Context Cross-site scripting (XSS) is a security vulnerability that affects web applications. It
occurs due to improper or lack of sanitization of user inputs. The security vulnerability …
occurs due to improper or lack of sanitization of user inputs. The security vulnerability …
Securing web applications from injection and logic vulnerabilities: Approaches and challenges
Context: Web applications are trusted by billions of users for performing day-to-day activities.
Accessibility, availability and omnipresence of web applications have made them a prime …
Accessibility, availability and omnipresence of web applications have made them a prime …
Using web security scanners to detect vulnerabilities in web services
Although Web services are becoming business-critical components, they are often deployed
with critical software bugs that can be maliciously explored. Web vulnerability scanners …
with critical software bugs that can be maliciously explored. Web vulnerability scanners …
Mitigating program security vulnerabilities: Approaches and challenges
Programs are implemented in a variety of languages and contain serious vulnerabilities
which might be exploited to cause security breaches. These vulnerabilities have been …
which might be exploited to cause security breaches. These vulnerabilities have been …
A survey of detection methods for XSS attacks
Cross-site scripting attack (abbreviated as XSS) is an unremitting problem for the Web
applications since the early 2000s. It is a code injection attack on the client-side where an …
applications since the early 2000s. It is a code injection attack on the client-side where an …