A Review on detection of cross-site scripting attacks (XSS) in web security

JM Gan, HY Ling, YB Leau - … , ACeS 2020, Penang, Malaysia, December 8 …, 2021 - Springer
Cybersecurity is one of the pillars of the growth of the digital industry, Industry Revolution
4.0. The network universe has several forms of cyber threats. Web application is the most …

Automated versus manual approach of web application penetration testing

N Singh, V Meherhomji… - 2020 11th International …, 2020 - ieeexplore.ieee.org
The main aim of this work is to find and explain certain scenarios that can demonstrate the
differences in automated and manual approaches for penetration testing. There are some …

[PDF][PDF] Penetration testing using Kali linux: SQL injection, XSS, wordpres, and WPA2 attacks

TS Gunawan, MK Lim, M Kartiwi, NA Malik… - Indonesian Journal of …, 2018 - academia.edu
Nowadays, computers, smart phones, smart watches, printers, projectors, washing
machines, fridges, and other mobile devices connected to Internet are exposed to various …

Development of web browser prototype with embedded classification capability for mitigating Cross-Site Scripting attacks

VK Malviya, S Rai, A Gupta - Applied Soft Computing, 2021 - Elsevier
Abstract Mitigation of Cross-Site Scripting (XSS) with machine learning techniques is the
recent interest of researchers. A large amount of research work is reported in this domain. A …

[PDF][PDF] Authentication and authorization mechanism for cloud security

JV Chandra, N Challa… - International Journal of …, 2019 - researchgate.net
Cloud Computing is a most widespread and popular form of computing, promising high
reliability for customers and providers both at the same point of time for many fields, where …

[PDF][PDF] On the review and setup of security audit using Kali Linux

TS Gunawan, MK Lim, NF Zulkurnain… - Indonesian Journal of …, 2018 - researchgate.net
The massive development of technology especially in computers, mobile devices, and
networking has bring security issue forward as primarily concern. The computers and mobile …

[PDF][PDF] insecure://vulnerability analysis of URI scheme handling in android mobile browsers

A Aldoseri, D Oswald - … , attacks, and defenses for the web …, 2022 - ndss-symposium.org
Uniform Resource Identifier (URI) schemes instruct browsers to conduct specific actions
depending on the requested scheme. Previous research has addressed numerous issues …

Improving Network, Data and Application Security for SMEs

C Tselios, I Politis, C Xenakis - … of the 17th International Conference on …, 2022 - dl.acm.org
The evolution of Information and Communications Technology and Cloud Computing,
combined with the advent of novel telecommunication frameworks such as 5G, have …

[PDF][PDF] Survey on SQL Injection and Cross-Site Scripting Malware Injection Attacks

S Krishnan, M Zolkipli - Certified Journal, 2023 - ijaem.net
A malware injection attack is a type of cyberattack where an attacker exploits vulnerabilities
in software applications to inject malicious code into a target system. This code can then …

Detecting Cross-Site Scripting Attack using Machine Learning Algorithms

S Karthika, G Padmavathi, A Roshni… - … on Computing for …, 2024 - ieeexplore.ieee.org
Cross-Site scripting attacks can have a significant impact on a user's computer due to their
ability to infect it with malware. This is because the code is embedded in a vulnerable …