Efficiency and effectiveness of web application vulnerability detection approaches: A review

B Zhang, J Li, J Ren, G Huang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Most existing surveys and reviews on web application vulnerability detection (WAVD)
approaches focus on comparing and summarizing the approaches' technical details …

Cross-site scripting (XSS) attacks and mitigation: A survey

GE Rodríguez, JG Torres, P Flores, DE Benavides - Computer Networks, 2020 - Elsevier
The results of the Cisco 2018 Annual Security Report show that all analyzed web
applications have at least one vulnerability. It also shows that web attacks are becoming …

[HTML][HTML] Cross-site scripting attacks and defensive techniques: A comprehensive survey

SJY Weamie - International Journal of Communications, Network and …, 2022 - scirp.org
The advancement of technology and the digitization of organizational functions and services
have propelled the world into a new era of computing capability and sophistication. The …

XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud

S Gupta, BB Gupta - Multimedia Tools and Applications, 2018 - Springer
This article presents a novel framework XSS-Secure, which detects and alleviates the
propagation of Cross-Site Scripting (XSS) worms from the Online Social Network (OSN) …

Perspective motion segmentation via collaborative clustering

Z Li, J Guo, LF Cheong… - Proceedings of the IEEE …, 2013 - openaccess.thecvf.com
This paper addresses real-world challenges in the motion segmentation problem, including
perspective effects, missing data, and unknown number of motions. It first formulates the 3-D …

[图书][B] Cross-site scripting attacks: classification, attack, and countermeasures

BB Gupta, P Chaudhary - 2020 - taylorfrancis.com
Social network usage has increased exponentially in recent years. Platforms like Facebook,
Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but …

A signature-based intrusion detection system for web applications based on genetic algorithm

R Bronte, H Shahriar, HM Haddad - Proceedings of the 9th International …, 2016 - dl.acm.org
Web application attacks are an extreme threat to the world's information technology
infrastructure. A web application is generally defined as a client-server software application …

Understanding javascript vulnerabilities in large real-world android applications

W Song, Q Huang, J Huang - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
JavaScript-related vulnerabilities are becoming a major security threat to hybrid mobile
applications. In this article, we present a systematic study to understand how JavaScript is …

Large scale generation of complex and faulty PHP test cases

B Stivalet, E Fong - 2016 IEEE International conference on …, 2016 - ieeexplore.ieee.org
Develo** good test cases is an intellectually demanding and critical task, and it has a
strong impact on the effectiveness and efficiency of the whole testing process. This paper …

Multi-layer map** of cyberspace for intrusion detection

S Shao, P Satam, S Satam, K Al-Awady… - 2021 IEEE/ACS 18th …, 2021 - ieeexplore.ieee.org
The ubiquity and vulnerability of computer applications make them ideal places for intrusion
attacks that increase in intensity and complexity. Computer applications have a relationship …