Efficiency and effectiveness of web application vulnerability detection approaches: A review
Most existing surveys and reviews on web application vulnerability detection (WAVD)
approaches focus on comparing and summarizing the approaches' technical details …
approaches focus on comparing and summarizing the approaches' technical details …
Cross-site scripting (XSS) attacks and mitigation: A survey
The results of the Cisco 2018 Annual Security Report show that all analyzed web
applications have at least one vulnerability. It also shows that web attacks are becoming …
applications have at least one vulnerability. It also shows that web attacks are becoming …
[HTML][HTML] Cross-site scripting attacks and defensive techniques: A comprehensive survey
SJY Weamie - International Journal of Communications, Network and …, 2022 - scirp.org
The advancement of technology and the digitization of organizational functions and services
have propelled the world into a new era of computing capability and sophistication. The …
have propelled the world into a new era of computing capability and sophistication. The …
XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud
This article presents a novel framework XSS-Secure, which detects and alleviates the
propagation of Cross-Site Scripting (XSS) worms from the Online Social Network (OSN) …
propagation of Cross-Site Scripting (XSS) worms from the Online Social Network (OSN) …
Perspective motion segmentation via collaborative clustering
This paper addresses real-world challenges in the motion segmentation problem, including
perspective effects, missing data, and unknown number of motions. It first formulates the 3-D …
perspective effects, missing data, and unknown number of motions. It first formulates the 3-D …
[图书][B] Cross-site scripting attacks: classification, attack, and countermeasures
BB Gupta, P Chaudhary - 2020 - taylorfrancis.com
Social network usage has increased exponentially in recent years. Platforms like Facebook,
Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but …
Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but …
A signature-based intrusion detection system for web applications based on genetic algorithm
R Bronte, H Shahriar, HM Haddad - Proceedings of the 9th International …, 2016 - dl.acm.org
Web application attacks are an extreme threat to the world's information technology
infrastructure. A web application is generally defined as a client-server software application …
infrastructure. A web application is generally defined as a client-server software application …
Understanding javascript vulnerabilities in large real-world android applications
JavaScript-related vulnerabilities are becoming a major security threat to hybrid mobile
applications. In this article, we present a systematic study to understand how JavaScript is …
applications. In this article, we present a systematic study to understand how JavaScript is …
Large scale generation of complex and faulty PHP test cases
B Stivalet, E Fong - 2016 IEEE International conference on …, 2016 - ieeexplore.ieee.org
Develo** good test cases is an intellectually demanding and critical task, and it has a
strong impact on the effectiveness and efficiency of the whole testing process. This paper …
strong impact on the effectiveness and efficiency of the whole testing process. This paper …
Multi-layer map** of cyberspace for intrusion detection
The ubiquity and vulnerability of computer applications make them ideal places for intrusion
attacks that increase in intensity and complexity. Computer applications have a relationship …
attacks that increase in intensity and complexity. Computer applications have a relationship …