The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
The detection of software vulnerability requires critical attention during the development
phase to make it secure and less vulnerable. Vulnerable software always invites hackers to …
phase to make it secure and less vulnerable. Vulnerable software always invites hackers to …
A literature review of using machine learning in software development life cycle stages
The software engineering community is rapidly adopting machine learning for transitioning
modern-day software towards highly intelligent and self-learning systems. However, the …
modern-day software towards highly intelligent and self-learning systems. However, the …
A survey on machine learning techniques for source code analysis
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …
these techniques to a myriad of software engineering tasks that use source code analysis …
A survey of exploitation and detection methods of XSS vulnerabilities
M Liu, B Zhang, W Chen, X Zhang - IEEE access, 2019 - ieeexplore.ieee.org
As web applications become more prevalent, web security becomes more and more
important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common …
important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common …
[HTML][HTML] A survey on machine learning techniques applied to source code
The advancements in machine learning techniques have encouraged researchers to apply
these techniques to a myriad of software engineering tasks that use source code analysis …
these techniques to a myriad of software engineering tasks that use source code analysis …
Deep learning for vulnerability and attack detection on web applications: A systematic literature review
RL Alaoui, EH Nfaoui - Future Internet, 2022 - mdpi.com
Web applications are the best Internet-based solution to provide online web services, but
they also bring serious security challenges. Thus, enhancing web applications security …
they also bring serious security challenges. Thus, enhancing web applications security …
Efficiency and effectiveness of web application vulnerability detection approaches: A review
Most existing surveys and reviews on web application vulnerability detection (WAVD)
approaches focus on comparing and summarizing the approaches' technical details …
approaches focus on comparing and summarizing the approaches' technical details …
Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review
Cross channel scripting (XCS) is a common web application vulnerability, which is a variant
of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network …
of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network …
Machine learning for software engineering: A systematic mapping
Context: The software development industry is rapidly adopting machine learning for
transitioning modern day software systems towards highly intelligent and self-learning …
transitioning modern day software systems towards highly intelligent and self-learning …
Distributed web hacking by adaptive consensus-based reinforcement learning
In this paper, we propose a novel adaptive consensus-based learning algorithm for
automated and distributed web hacking. We aim to assist ethical hackers in conducting …
automated and distributed web hacking. We aim to assist ethical hackers in conducting …