Cross-site scripting (XSS) attacks and mitigation: A survey

GE Rodríguez, JG Torres, P Flores, DE Benavides - Computer Networks, 2020 - Elsevier
The results of the Cisco 2018 Annual Security Report show that all analyzed web
applications have at least one vulnerability. It also shows that web attacks are becoming …

GraphXSS: an efficient XSS payload detection approach based on graph convolutional network

Z Liu, Y Fang, C Huang, J Han - Computers & Security, 2022 - Elsevier
With the rapid development of the Internet age today, Web applications have become very
common in modern society. Web applications are often applied to a social network, media …

Providing email privacy by preventing webmail from loading malicious XSS payloads

Y Fang, Y Xu, P Jia, C Huang - Applied Sciences, 2020 - mdpi.com
With the development of internet technology, email has become the formal communication
method in modern society. Email often contains a large amount of personal privacy …

Web application safety by penetration testing

A Hasan, D Meva - International Journal of Advanced Studies of …, 2018 - papers.ssrn.com
By taking advantage of vulnerability, Cyber criminals is easily able to steal confidential data
of the ICT, results in heavy loss. Vulnerability Assessment and penetration testing is a …

An efficient network traffic classification method based on combined feature dimensionality reduction

Y Geng, S Cai, S Qin, H Chen… - 2021 IEEE 21st …, 2021 - ieeexplore.ieee.org
Network traffic classification is the key process of malicious traffic identification. It determines
the type of network traffic from a large amount of network traffic data according to the …

Penetration Testing for the Cloud-Based Web Application

R Al-Khannak, SS Nehal - International Conference on Information and …, 2023 - Springer
This paper discusses methods, tools, approaches, and techniques used for the penetration
testing on the cloud-based web application on Amazon AWS platform. The findings of a …

DPLOOP: detection and prevention of loopholes in web application security

Monika, V Tiwari - … and Communication Technology: Proceedings of CICT …, 2021 - Springer
Web application loopholes are related to different components. Defeat correctly sanitized
users' given input is one of the prominent features that accompany to run illegal snippets in …

[PDF][PDF] Web application security using VAPT

K Jatinkushwah, S Dutt, R Jhunjhunwala… - … , vol. 2, p. 389, 2020. doi …, 2020 - ijaem.net
By taking advantage of a vulnerability, Cybercriminals are easily able to steal confidential
data of the ICT, resulting in heavy loss. Vulnerability Assessment and penetration testing is a …

Модели и сценарии реализации угроз для интернет-ресурсов

СА Лесько - Russian Technological Journal, 2020 - rtj-mirea.ru
Аннотация Для облегчения обнаружения различных уязвимостей существует
множество различных инструментов (сканеров), которые могут помочь в анализе …

Integrating the escaping technique in preventing cross site scripting in an online inventory system

JA Caliwag, RA Pagaduan, RE Castillo… - Proceedings of the 2nd …, 2019 - dl.acm.org
This paper discusses the implementation of the Escaping Technique in an Online Inventory
System to prevent the Cross Site Scripting (XSS) attack. It also covers discussion about XSS …