[HTML][HTML] Machine and deep learning-based XSS detection approaches: a systematic literature review

IK Thajeel, K Samsudin, SJ Hashim… - Journal of King Saud …, 2023 - Elsevier
Web applications are paramount tools for facilitating services providing in the modern world.
Unfortunately, the tremendous growth in the web application usage has resulted in a rise in …

Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature …

S Hussain, M Nadeem, J Baber, M Hamdi, A Rajab… - Scientific Reports, 2024 - nature.com
Software vulnerabilities pose a significant threat to system security, necessitating effective
automatic detection methods. Current techniques face challenges such as dependency …

[HTML][HTML] Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model

IK Thajeel, K Samsudin, SJ Hashim… - Journal of King Saud …, 2023 - Elsevier
Web applications' popularity has raised attention in various service domains, which
increased the concern about cyber-attacks. One of these most serious and frequent web …

[HTML][HTML] An analytical review of the source code models for exploit analysis

E Fedorchenko, E Novikova, A Fedorchenko… - Information, 2023 - mdpi.com
Currently, enhancing the efficiency of vulnerability detection and assessment remains
relevant. We investigate a new approach for the detection of vulnerabilities that can be used …

Vulnerable JavaScript functions detection using stacking of convolutional neural networks

A Sheneamer - PeerJ Computer Science, 2024 - peerj.com
Abstract System security for web-based applications is paramount, and for the avoidance of
possible cyberattacks it is important to detect vulnerable JavaScript functions. Developers …

Sni** at web applications to discover input-handling vulnerabilities

C Brandi, G Perrone, SP Romano - Journal of Computer Virology and …, 2024 - Springer
Web applications play a crucial role in modern businesses, offering various services and
often exposing sensitive data that can be enticing to attackers. As a result, there is a growing …

LLM-AE-MP: Web attack detection using a large language model with autoencoder and multilayer perceptron

J Yang, Y Wu, Y Yuan, H Xue, S Bourouis… - Expert Systems with …, 2025 - Elsevier
Web applications store sensitive data, making them prime targets for cybercriminals and
posing national security risks. This study introduces a new approach to distinguishing …

A study of vulnerability scanners for detecting SQL injection and XSS attack in websites

S Sharma - Artificial Intelligence and Applications, 2023 - ojs.bonviewpress.com
In the modern world, the internet makes our lives easier. Making use of online services like
social media, online banking, and online shop** can provide information while also …

AI in Combatting Man-in-the-Middle Attacks: A Comprehensive Review

N Mohamed, AA Ahmed - 2024 15th International Conference …, 2024 - ieeexplore.ieee.org
In the evolving landscape of cybersecurity, Man-in-the-Middle (MitM) attacks represent a
significant and persistent threat, capable of intercepting and manipulating digital …

[HTML][HTML] CrossCode2Vec: A unified representation across source and binary functions for code similarity detection

G Yu, J An, J Lyu, W Huang, W Fan, Y Cheng, A Sui - Neurocomputing, 2025 - Elsevier
Code similarity detection identifies code by analyzing similarities in syntax, semantics, and
structure, which includes types of tasks: source-to-source, binary-to-binary, and source-to …