Journal articles on the topic 'Browser Vulnerability'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Browser Vulnerability.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Fajar, Abdullah, Setiadi Yazid, ., and . "Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant?" International Journal of Engineering & Technology 7, no. 4.44 (2018): 242. http://dx.doi.org/10.14419/ijet.v7i4.44.26999.
Full textChalyi, Oleksii, Kęstutis Driaunys, and Vytautas Rudžionis. "Assessing Browser Security: A Detailed Study Based on CVE Metrics." Future Internet 17, no. 3 (2025): 104. https://doi.org/10.3390/fi17030104.
Full textJunjie Wang, Xiaohong Li, Bobo Yan, and Zhiyong Feng. "Pointer Analysis Based Vulnerability Detection for Browser Extension." International Journal of Digital Content Technology and its Applications 6, no. 1 (2012): 488–95. http://dx.doi.org/10.4156/jdcta.vol6.issue1.59.
Full textRay, Loye Lynn. "Countering Cross-Site Scripting in Web-based Applications." International Journal of Strategic Information Technology and Applications 6, no. 1 (2015): 57–68. http://dx.doi.org/10.4018/ijsita.2015010105.
Full textJohnston, Reuben, Shahryar Sarkani, Thomas Mazzuchi, Thomas Holzer, and Timothy Eveleigh. "Multivariate models using MCMCBayes for web-browser vulnerability discovery." Reliability Engineering & System Safety 176 (August 2018): 52–61. http://dx.doi.org/10.1016/j.ress.2018.03.024.
Full textPriyanka, K., Krishna P. Yuvan, Kumar JS Ajay, J. Dharun, N. Rooban, and N. Vinayagamoorthy. "Web Extension for Recon." Journal of Research and Review: Hacking Techniques and Information Security Systems 1, no. 2 (2025): 11–16. https://doi.org/10.5281/zenodo.15589787.
Full textJohnston, Reuben, Shahryar Sarkani, Thomas Mazzuchi, Thomas Holzer, and Timothy Eveleigh. "Bayesian-model averaging using MCMCBayes for web-browser vulnerability discovery." Reliability Engineering & System Safety 183 (March 2019): 341–59. http://dx.doi.org/10.1016/j.ress.2018.11.030.
Full textDarmawan, Candra, Julius Panda Putra Naibaho, and Alex De Kweldju. "Penerapan Metode Vulnerability Assessment untuk Identifikasi Keamanan Website berdasarkan OWASP ID Tahun 2021." Edumatic: Jurnal Pendidikan Informatika 8, no. 1 (2024): 272–81. http://dx.doi.org/10.29408/edumatic.v8i1.25834.
Full textWei, Qiang, Ze Hui Wu, Rong Hua Tao, and Dong Ren. "Authentication Algorithm Based on Hash-Tree for Web Single Sign-On." Applied Mechanics and Materials 490-491 (January 2014): 1368–73. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1368.
Full textRevyakina, Yelena, Larissa Cherckesova, Olga Safaryan, Denis Korochentsev, Nikolay Boldyrikhin, and Yuri Ivanov. "Possibilities of conducting XSS-attacks and the development of countermeasures." E3S Web of Conferences 224 (2020): 01040. http://dx.doi.org/10.1051/e3sconf/202022401040.
Full textHossain, Shahriar, North Sarah, and Chen Wei-Chuen. "EARLY DETECTION OF SQL INJECTION ATTACKS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 53–65. https://doi.org/10.5281/zenodo.4451606.
Full textSahana, M. P., and Joyce Lobo Sonali. "A Study on Advanced Cross Site Request Forgery Attacks and its Prevention." Journal of Web Development and Web Designing 4, no. 2 (2019): 31–35. https://doi.org/10.5281/zenodo.3346240.
Full textVivek, Somi. "Cross-Origin Resource Sharing Vulnerability Testing: Techniques and Implications." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 6 (2022): 1–11. https://doi.org/10.5281/zenodo.15593627.
Full textMira Orisa and Michael Ardita. "VULNERABILITY ASSESMENT UNTUK MENINGKATKAN KUALITAS KEMANAN WEB." Jurnal Mnemonic 4, no. 1 (2021): 16–19. http://dx.doi.org/10.36040/mnemonic.v4i1.3213.
Full textBuja, Alya Geogiana, Nurul Syahirah Khairuddin, Noor Afni Deraman, and Khyrina Airin Fariza Abu Samah. "Development of a browser extension for web application vulnerability detection, avoidance, and secure browsing (VDAS)." International Journal of Advanced Technology and Engineering Exploration 8, no. 77 (2021): 537–44. http://dx.doi.org/10.19101/ijatee.2020.762187.
Full textVamsi, Mohan, and Sandeep Malik Dr. "Secure Web Applications Against Cross Site Scripting XSS A Review." International Journal of Trend in Scientific Research and Development 2, no. 1 (2017): 900–903. https://doi.org/10.31142/ijtsrd7135.
Full textKhusnani, Azmi, Adi Jufriansah, and Mulya Afriyanto. "Utilization of Seismic Data as a Tsunami Vulnerability Review." Indonesian Review of Physics 5, no. 2 (2022): 66–72. http://dx.doi.org/10.12928/irip.v5i2.6706.
Full textSyverson, Paul, Rasmus Dahlberg, Tobias Pulls, and Rob Jansen. "Onion-Location Measurements and Fingerprinting." Proceedings on Privacy Enhancing Technologies 2025, no. 2 (2025): 512–26. https://doi.org/10.56553/popets-2025-0074.
Full textPrazyan, K. A. "BASIC PRINCIPLES OF BUILDING BLACK-BOX VULNERABILITY SCANNER OF WEB RESOURCE." Issues of radio electronics, no. 11 (November 20, 2018): 45–47. http://dx.doi.org/10.21778/2218-5453-2018-11-45-47.
Full textBhatt, Navneet, Adarsh Anand, and Deepti Aggrawal. "Improving system reliability by optimal allocation of resources for discovering software vulnerabilities." International Journal of Quality & Reliability Management 37, no. 6/7 (2019): 1113–24. http://dx.doi.org/10.1108/ijqrm-07-2019-0246.
Full textRahman, Aulia, Indra Indra, Nuralamsah Zulkarnaim, Muhammad Mukhram, and Agung Rizaldi. "ANALISIS IMPLEMENTASI NUCKLEI VULNERABILITY DAN OWASP-ZAP SCANNER UNTUK DETEKSI KERENTANAN KEAMANAN (SECURE SYSTEM) PADA PLATFORM WEB BASED." Jurnal Komputer Terapan 11, no. 1 (2025): 10–15. https://doi.org/10.35143/jkt.v11i1.6430.
Full textHarnes, Håkon, and Donn Morrison. "SoK: Analysis Techniques for WebAssembly." Future Internet 16, no. 3 (2024): 84. http://dx.doi.org/10.3390/fi16030084.
Full textPrazyan, К. А. "EXECUTION AFTER REDIRECTION VULNERABILITIES IN WEB-APPLICATIONS." Issues of radio electronics, no. 3 (March 20, 2019): 71–73. http://dx.doi.org/10.21778/2218-5453-2019-3-71-73.
Full textKurniawan, Ade. "Penerapan Framework OWASP dan Network Forensics untuk Analisis, Deteksi, dan Pencegahan Serangan Injeksi di Sisi Host-Based." Jurnal Telematika 14, no. 1 (2020): 9–18. http://dx.doi.org/10.61769/telematika.v14i1.267.
Full textMauricio, Leopoldo, and Marcelo Rubinstein. "A Network Function Virtualization Architecture for Automatic and Efficient Detection and Mitigation against Web Application Malware." Journal of Internet Services and Applications 14, no. 1 (2023): 10–20. http://dx.doi.org/10.5753/jisa.2023.2847.
Full textKepkowski, Michal, Lucjan Hanzlik, Ian Wood, and Mohamed Ali Kaafar. "How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 705–26. http://dx.doi.org/10.56553/popets-2022-0129.
Full textAde Gustiyonoo, Erick Irawadi Alwi, and Syahrul Mubarak Abdullah. "Analisa Kerentanan Website Terhadap Serangan Cross-Site Scripting (XSS) Metode Penetration Testing." Cyber Security dan Forensik Digital 7, no. 1 (2024): 25–33. http://dx.doi.org/10.14421/csecurity.2024.7.1.4432.
Full textM, Indushree, Manjit Kaur, Manish Raj, Shashidhara R, and Heung-No Lee. "Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review." Sensors 22, no. 5 (2022): 1959. http://dx.doi.org/10.3390/s22051959.
Full textAbraham Kalloor, Eric, Dr Manoj Kumar Mishra, and Prof Joy Paulose. "Phishfort – Anti-Phishing Framework." International Journal of Engineering & Technology 7, no. 3.4 (2018): 42. http://dx.doi.org/10.14419/ijet.v7i3.4.14673.
Full textShahriar, Hossain, Sarah North, Wei-Chuen Chen, and Edward Mawangi. "Information Theoretic XSS Attack Detection in Web Applications." International Journal of Secure Software Engineering 5, no. 3 (2014): 1–15. http://dx.doi.org/10.4018/ijsse.2014070101.
Full textAnkit, Mistry Mahima. "Unveiling the Underbelly of Web Application Vulnerabilities: A Critical Exploration." International Journal for Research in Applied Science and Engineering Technology 12, no. 10 (2024): 485–90. http://dx.doi.org/10.22214/ijraset.2024.64566.
Full textDr., AMMAR ALDALLAL, and KASHIF SHABBIR Dr. "Protecting Web Applications from Cross-Site Scripting Attacks." JOURNAL OF APPLIED ENGINEERING RESEARCH 2017, no. 03 (2017): 18. https://doi.org/10.5281/zenodo.849089.
Full textΚουτουπές, Σ., Γ. Καραντώνης, Α. Σωτηριάδης, et al. "SEISIMPACT-THES: DESIGN, DEVELOPMENT AND APPLICATION OF AN INFORMATION SYSTEM TO ASSESS THE VULNERABILITY TO EARTHQUAKE HAZARD OF THE BUILT ENVIRONMENT OF THE PREFECTURE OF THESSALONIKI." Bulletin of the Geological Society of Greece 36, no. 3 (2004): 1328. http://dx.doi.org/10.12681/bgsg.16477.
Full textDanuri, Muhamad, Heru Suistiyo, and Wahyono. "Evaluation of The Cyber Religious Education Media with PIECES Framework." Journal of Information Systems and Digital Technologies 2, no. 2 (2020): 58–71. http://dx.doi.org/10.31436/jisdt.v2i2.130.
Full textFu, Yu, Bin Yang, Yaoyuan Cui, et al. "BRD4 inhibition impairs DNA mismatch repair, induces mismatch repair mutation signatures and creates therapeutic vulnerability to immune checkpoint blockade in MMR-proficient tumors." Journal for ImmunoTherapy of Cancer 11, no. 4 (2023): e006070. http://dx.doi.org/10.1136/jitc-2022-006070.
Full textDi Girolamo, G., S. Peracchia, M. Boero, I. F. Bracco, and F. Oliva. "Streptococcal infections, autoimmunity, and innate immune system in adult ADHD: A preliminary study." European Psychiatry 65, S1 (2022): S335. http://dx.doi.org/10.1192/j.eurpsy.2022.853.
Full textAlves, Flaviano de Souza. "CRIMINALIDADE NA DEEP WEB." Revista da Escola Superior de Guerra 33, no. 67 (2019): 123–41. http://dx.doi.org/10.47240/revistadaesg.v33i67.910.
Full textNasenok, Kyrylo, and Maria Voitsekhovska. "Client-side rendering issues in the modern worldwide networ." Technical sciences and technologies, no. 4 (38) (December 30, 2024): 197–207. https://doi.org/10.25140/2411-5363-2024-4(38)-197-207.
Full textMovahedi, Yazdan, Michel Cukier, Ambrose Andongabo, and Ilir Gashi. "Cluster-based vulnerability assessment of operating systems and web browsers." Computing 101, no. 2 (2018): 139–60. http://dx.doi.org/10.1007/s00607-018-0663-0.
Full textAlgarni, Abdullah M. "The Historical Relationship between the Software Vulnerability Lifecycle and Vulnerability Markets: Security and Economic Risks." Computers 11, no. 9 (2022): 137. http://dx.doi.org/10.3390/computers11090137.
Full textJoh, HyunChul. "Software Risk Assessment for Windows Operating Systems with respect to CVSS." European Journal of Engineering Research and Science 4, no. 11 (2019): 41–45. http://dx.doi.org/10.24018/ejers.2019.4.11.1610.
Full textJoh, HyunChul. "Software Risk Assessment for Windows Operating Systems with respect to CVSS." European Journal of Engineering and Technology Research 4, no. 11 (2019): 41–45. http://dx.doi.org/10.24018/ejeng.2019.4.11.1610.
Full textZahro, Avidah Amalia. "Development and Analysis Report Information System Quality Web-Based Student Learning Outcomes at SMK Negeri 1 Banyumas." Jurnal Manajemen Informatika Medicom (JMI) 10, no. 2 (2022): 14–20. http://dx.doi.org/10.35335/jmi.v10i2.3.
Full textKang, Seokchan, and Jiyeong Lee. "Developing a Tile-Based Rendering Method to Improve Rendering Speed of 3D Geospatial Data with HTML5 and WebGL." Journal of Sensors 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/9781307.
Full textD’Arienzo, Maurizio, and Serena Gracco. "A Survey on CDN Vulnerability to DoS Attacks." International journal of Computer Networks & Communications 15, no. 5 (2023): 127–45. http://dx.doi.org/10.5121/ijcnc.2023.15508.
Full textCubas, Jonay, Severin D. H. Irl, Rafael Villafuerte, et al. "Endemic plant species are more palatable to introduced herbivores than non-endemics." Proceedings of the Royal Society B: Biological Sciences 286, no. 1900 (2019): 20190136. http://dx.doi.org/10.1098/rspb.2019.0136.
Full textVeprev, Sergei B., Sergei A. Nesterovich, and Aleksandr V. Makarov. "VULNERABILITY ANALYSIS IN OPERATING SYSTEMS AND APPLICATION SOFTWARE PRODUCTS." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 1 (2025): 95–105. https://doi.org/10.28995/2686-679x-2025-1-95-105.
Full textHaff, Tonya M., and Robert D. Magrath. "To call or not to call: parents assess the vulnerability of their young before warning them about predators." Biology Letters 9, no. 6 (2013): 20130745. http://dx.doi.org/10.1098/rsbl.2013.0745.
Full textRiadi, Imam, Rusydi Umar, and Tri Lestari. "Analisis Kerentanan Serangan Cross Site Scripting (XSS) pada Aplikasi Smart Payment Menggunakan Framework OWASP." JISKA (Jurnal Informatika Sunan Kalijaga) 5, no. 3 (2020): 146. http://dx.doi.org/10.14421/jiska.2020.53-02.
Full textPan, Jiaye, and Yi Zhuang. "PMCAP: A Threat Model of Process Memory Data on the Windows Operating System." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/4621587.
Full text