Edge computing security: State of the art and challenges
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …
years have been dramatically incentivizing the advancement of edge computing. On the one …
Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review
With the rising demand for E-commerce, Social Networking websites, it has become
essential to develop security protocols over the World Wide Web that can provide security …
essential to develop security protocols over the World Wide Web that can provide security …
Blockiotintelligence: A blockchain-enabled intelligent IoT architecture with artificial intelligence
In the recent year, Internet of Things (IoT) is industrializing in several real-world applications
such as smart transportation, smart city to make human life reliable. With the increasing …
such as smart transportation, smart city to make human life reliable. With the increasing …
BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network
S Rathore, BW Kwon, JH Park - Journal of Network and Computer …, 2019 - Elsevier
The exponential growth of the use of insecure stationary and portable devices in the Internet
of Things (IoT) network of the smart city has made the security of the smart city against cyber …
of Things (IoT) network of the smart city has made the security of the smart city against cyber …
A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions
D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …
high-speed data transfer. The data collected fuel many automation applications such as …
MLPXSS: an integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique
FMM Mokbal, W Dan, A Imran, L Jiuchuan… - IEEE …, 2019 - ieeexplore.ieee.org
Dynamic web applications play a vital role in providing resources manipulation and
interaction between clients and servers. The features presently supported by browsers have …
interaction between clients and servers. The features presently supported by browsers have …
Personality classification based on profiles of social networks' users and the five-factor model of personality
A Souri, S Hosseinpour, AM Rahmani - Human-centric Computing and …, 2018 - Springer
Online social networks have become demanded ways for users to show themselves and
connect and share information with each other among these social networks. Facebook is …
connect and share information with each other among these social networks. Facebook is …
User characteristics that influence judgment of social engineering attacks in social networks
SM Albladi, GRS Weir - Human-centric Computing and Information …, 2018 - Springer
Social engineering is a growing source of information security concern. Exploits appear to
evolve, with increasing levels of sophistication, in order to target multiple victims. Despite …
evolve, with increasing levels of sophistication, in order to target multiple victims. Despite …
A survey of exploitation and detection methods of XSS vulnerabilities
M Liu, B Zhang, W Chen, X Zhang - IEEE access, 2019 - ieeexplore.ieee.org
As web applications become more prevalent, web security becomes more and more
important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common …
important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common …
An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence
Y Zhou, P Wang - Computers & Security, 2019 - Elsevier
Cross-site scripting (XSS) attack is one of the most dangerous attacks for web security.
Traditional XSS detection methods mainly focus on the vulnerability itself, relying on static …
Traditional XSS detection methods mainly focus on the vulnerability itself, relying on static …