Cross-site scripting (XSS) attacks and mitigation: A survey
The results of the Cisco 2018 Annual Security Report show that all analyzed web
applications have at least one vulnerability. It also shows that web attacks are becoming …
applications have at least one vulnerability. It also shows that web attacks are becoming …
GraphXSS: an efficient XSS payload detection approach based on graph convolutional network
Z Liu, Y Fang, C Huang, J Han - Computers & Security, 2022 - Elsevier
With the rapid development of the Internet age today, Web applications have become very
common in modern society. Web applications are often applied to a social network, media …
common in modern society. Web applications are often applied to a social network, media …
Providing email privacy by preventing webmail from loading malicious XSS payloads
With the development of internet technology, email has become the formal communication
method in modern society. Email often contains a large amount of personal privacy …
method in modern society. Email often contains a large amount of personal privacy …
Web application safety by penetration testing
A Hasan, D Meva - International Journal of Advanced Studies of …, 2018 - papers.ssrn.com
By taking advantage of vulnerability, Cyber criminals is easily able to steal confidential data
of the ICT, results in heavy loss. Vulnerability Assessment and penetration testing is a …
of the ICT, results in heavy loss. Vulnerability Assessment and penetration testing is a …
An efficient network traffic classification method based on combined feature dimensionality reduction
Y Geng, S Cai, S Qin, H Chen… - 2021 IEEE 21st …, 2021 - ieeexplore.ieee.org
Network traffic classification is the key process of malicious traffic identification. It determines
the type of network traffic from a large amount of network traffic data according to the …
the type of network traffic from a large amount of network traffic data according to the …
Penetration Testing for the Cloud-Based Web Application
R Al-Khannak, SS Nehal - International Conference on Information and …, 2023 - Springer
This paper discusses methods, tools, approaches, and techniques used for the penetration
testing on the cloud-based web application on Amazon AWS platform. The findings of a …
testing on the cloud-based web application on Amazon AWS platform. The findings of a …
DPLOOP: detection and prevention of loopholes in web application security
Web application loopholes are related to different components. Defeat correctly sanitized
users' given input is one of the prominent features that accompany to run illegal snippets in …
users' given input is one of the prominent features that accompany to run illegal snippets in …
[PDF][PDF] Web application security using VAPT
K Jatinkushwah, S Dutt, R Jhunjhunwala… - … , vol. 2, p. 389, 2020. doi …, 2020 - ijaem.net
By taking advantage of a vulnerability, Cybercriminals are easily able to steal confidential
data of the ICT, resulting in heavy loss. Vulnerability Assessment and penetration testing is a …
data of the ICT, resulting in heavy loss. Vulnerability Assessment and penetration testing is a …
Модели и сценарии реализации угроз для интернет-ресурсов
СА Лесько - Russian Technological Journal, 2020 - rtj-mirea.ru
Аннотация Для облегчения обнаружения различных уязвимостей существует
множество различных инструментов (сканеров), которые могут помочь в анализе …
множество различных инструментов (сканеров), которые могут помочь в анализе …
Integrating the escaping technique in preventing cross site scripting in an online inventory system
JA Caliwag, RA Pagaduan, RE Castillo… - Proceedings of the 2nd …, 2019 - dl.acm.org
This paper discusses the implementation of the Escaping Technique in an Online Inventory
System to prevent the Cross Site Scripting (XSS) attack. It also covers discussion about XSS …
System to prevent the Cross Site Scripting (XSS) attack. It also covers discussion about XSS …