Academic literature on the topic 'CLIENT SIDE SCRIPTING'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'CLIENT SIDE SCRIPTING.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "CLIENT SIDE SCRIPTING"

1

Kumar, Mahesh. "Cross Site Scripting– Client Side Solution." IOSR Journal of Engineering 3, no. 7 (2013): 01–06. http://dx.doi.org/10.9790/3021-03740106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kirda, Engin, Nenad Jovanovic, Christopher Kruegel, and Giovanni Vigna. "Client-side cross-site scripting protection." Computers & Security 28, no. 7 (2009): 592–604. http://dx.doi.org/10.1016/j.cose.2009.04.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Zeng Ping, and Shu Hua Li. "The Research of Information Interaction between PHP and JavaScript." Advanced Materials Research 710 (June 2013): 692–95. http://dx.doi.org/10.4028/www.scientific.net/amr.710.692.

Full text
Abstract:
As one HTML embedded scripting language, PHP (Hypertext Preprocessor) is a powerful computer programming language which is a remarkable tool to enhance the expression of webpage. JavaScript is a client-side technology that is processed by the client-side software. But PHP is completely the server-side scripting language. It is a critical issue that how to effectively complete the clients request and transfer the information between two languages. The form is adopted in this paper. And based on that, the information transfer between two languages is tested. The result proves that in web project the interaction via form is an effective and reliable method.
APA, Harvard, Vancouver, ISO, and other styles
4

K.Patil, D., and K. R. Patil. "Client-side Automated Sanitizer for Cross-Site Scripting Vulnerabilities." International Journal of Computer Applications 121, no. 20 (2015): 1–8. http://dx.doi.org/10.5120/21653-5063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xia, Xiang, Zhi Shu Li, and Yi Xiang Fan. "The Advanced "Rich-Client" Method Based on DOM for the Dynamic and Configurable Web Application." Advanced Materials Research 756-759 (September 2013): 1691–95. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1691.

Full text
Abstract:
In order to meet the user requirement of the dynamic customization and configuration of the changeable and complicated page functionality on the client, when constructing the web application platform, an advanced rich-client method and technology based on DOM ( Document Object Model ) was designed and used to develop the client module. The client module with rich-client technology was in the traditional J2EE (Java 2 Enterprise Edition ) architecture which was the Client-Centric and MVC ( Model-View-Control ) mode. On the client side, according to the dynamic page generation algorithm, developers wrote JavaScript scripting language based on DOM and Ajax (Asynchronous JavaScript and XML) for user customization and choose the part of the third-party open-source Extjs ( Extendable JavaScript ) components as the page elements to generate client-side dynamic configuration interface. From a user experience perspective, The good performance test results of the advanced rich-client method effectively examine the distinguishing features of the new method.
APA, Harvard, Vancouver, ISO, and other styles
6

Nagarjun, PMD, and Shaik Shakeel Ahamad. "ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting attacks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 2 (2019): 1393. http://dx.doi.org/10.11591/ijece.v9i2.pp1393-1398.

Full text
Abstract:
<span lang="EN-US">Cross-Site Scripting (XSS) is one of serious web application attack. Web applications are involved in every activity of human life. JavaScript plays a major role in these web applications. In XSS attacks hacker inject malicious JavaScript into a trusted web application, execution of that malicious script may steal sensitive information from the user. Previous solutions to prevent XSS attacks require a lot of effort to integrate into existing web applications, some solutions works at client-side and some solutions works based on filter list which needs to be updated regularly. In this paper, we propose an Image Substitute technique (ImageSubXSS) to prevent Cross-Site Scripting attacks which works at the server-side. The proposed solution is implemented and evaluated on a number of XSS attacks. With a single line, developers can integrate ImageSubXSS into their applications and the proposed solution is able to prevent XSS attacks effectively.</span>
APA, Harvard, Vancouver, ISO, and other styles
7

Lesko, S. A. "Models and scenarios of implementation of threats for internet resources." Russian Technological Journal 8, no. 6 (2020): 9–33. http://dx.doi.org/10.32362/2500-316x-2020-8-6-9-33.

Full text
Abstract:
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection. But these tools for the most part can only identify problems, and they are not capable of fixing them. Therefore, the knowledge of the security developer is a key factor in building a secure Web resource. To resolve application security problems, developers must know all the ways and vectors of various attacks in order to be able to develop various protection mechanisms. This review discusses two of the most dangerous vulnerabilities in the field of Web technologies: SQL injections and XSS attacks (cross-site scripting – XSS), as well as specific cases and examples of their application, as well as various approaches to identifying vulnerabilities in applications and threat prevention. Cross-site scripting as well as SQL-injection attacks are related to validating input data. The mechanisms of these attacks are very similar, but in the XSS attacks the user is the victim, and in the SQL injection attacks, the database server of the Web application. In XSS attacks, malicious content is delivered to users by means of a client-side programming language such as JavaScript, while using SQL injection, the SQL database query language is used. At the same time, XSS attacks, unlike SQL injections, harm only the client side leaving the application server operational. Developers should develop security for both server components and the client part of the web application.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Cheng Zhong, Bang Yan Ye, and L. Liu. "Intelligent Design of a Mechanical Part Library in Real-Time Collaborative Design." Key Engineering Materials 455 (December 2010): 553–57. http://dx.doi.org/10.4028/www.scientific.net/kem.455.553.

Full text
Abstract:
In this paper an automatic and intelligent mechanical part library design framework is proposed by utilizing network resources through real-time collaborative design. The proposed framework is based on the client/server network environment, where Web-based scripting language is used for parametric drive design. On the server side, according to the characteristics of parts and data structures, an extensible library of mechanical parts is established for users to use. Graphics data compression algorithms used in the collaborative design are also put on the system's server-side. The proposed framework provides an effective way with information sharing and flexibility for modern mechanical product design.
APA, Harvard, Vancouver, ISO, and other styles
9

Pallavi, P., and Shaik Salam. "Online Command Area Water Resource Management System." APTIKOM Journal on Computer Science and Information Technologies 5, no. 2 (2020): 70–74. http://dx.doi.org/10.34306/csit.v5i2.141.

Full text
Abstract:
Water is an important, but often ignored element in sustainable development by now it has been clear that urgent action is needed to avoid global water crisis. Water resource management is the activity of planning, developing, distributing and managing the optimum use of water resources. Successful management of water resources requires accurate knowledge of their resource distribution to meet up the competing demands and mechanisms to make good decisions using advanced recent technologies.Towards evolving comprehensive management plan in suitable conservation and utilization of water resources space technology plays a crucial role in managing country’s available water resources. Systematic approaches involving judicious combination of conventional server side scripting programming and remote sensing techniques pave way for achieving optimum planning and operational of water resources projects. new methodologies and 24/7 accessible system need to be built, these by reducing the dependency on complex infrastructure an specialist domain Open source web GIS systems have proven their rich in application of server side scripting and easy to use client application tools. Present study and implementation aims to provide wizard based or easily driven tools online for command area management practices. In this large endeavour modules for handling remote sensing data, online raster processing, statistics and indices generation will be developed.
APA, Harvard, Vancouver, ISO, and other styles
10

Shaik, Saif Ali, Oleti B. Revanth, and S. Vigneshwari. "Customer to Customer Parking Reservation System." Journal of Computational and Theoretical Nanoscience 16, no. 8 (2019): 3304–10. http://dx.doi.org/10.1166/jctn.2019.8182.

Full text
Abstract:
The Online Vehicle Parking Reservation System (OVPRS) is a framework that empowers clients/drivers to save a parking spot. It additionally permits the clients/drivers to see the stopping status at individuals’ park. The venture went for taking care of such issues by planning an electronic framework that will empower the clients/drivers to reserve a spot of an accessible parking spot at individuals’ park. The necessities for the created framework were gathered utilizing perception and meeting the client and staff part from individuals’ park. The information from meetings was examined utilizing Microsoft Excel in order to think of the utilitarian, non-useful and framework necessities. These prerequisites were later used to plan the framework by making information stream outlines and substance relationship graphs. The planned framework was actualized utilizing diverse advancement instruments which incorporate HTML for making interfaces, CSS for styling marry pages, JavaScript, and jQuery for dynamism in the site pages and as an info approval tool. XAMPP was utilized to assemble the database and PHP utilized as a server-side scripting dialect to associate the UIs to the database. The framework was tried by the specialists for blunders.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "CLIENT SIDE SCRIPTING"

1

Behfarshad, Zahra. "Hidden-web induced by client-side scripting : an empirical study." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/46671.

Full text
Abstract:
Client-side JavaScript is increasingly used for enhancing web application functionality, interactivity, and responsiveness. Through the execution of JavaScript code in browsers, the DOM tree representing a webpage at runtime, can be incrementally updated without requiring a URL change. This dynamically updated content is hidden from general search engines. We present the first empirical study on measuring and characterizing the hidden-web induced as a result of client-side JavaScript execution. Our study reveals that this type of hidden-web content is prevalent in online web applications today: from the 500 websites we analyzed, 95% contain client-side hidden-web content; On those websites that contain client-side hidden-web content, (1) on average, 62% of the web states are hidden, (2) per hidden state, there is an average of 19 kilobytes of data that is hidden from which 0.6 kilobytes contain textual content, (3) the DIV element is the most common clickable element used (61%) to initiate this type of hidden-web state transition, and (4) on average 25 minutes is required to dynamically crawl 50 DOM states. Further, our study indicates that there is a correlation between DOM tree size and hidden-web content, but no correlation exists between the amount of JavaScript code and client-side hidden-web.
APA, Harvard, Vancouver, ISO, and other styles
2

Stock, Benjamin [Verfasser], Felix [Akademischer Betreuer] Freiling, and Michael [Akademischer Betreuer] Backes. "Untangling the Web of Client-Side Cross-Site Scripting / Benjamin Stock. Gutachter: Felix Freiling ; Michael Backes." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2015. http://d-nb.info/1076673856/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

DHARESHWAR, RAHUL G. "DEVELOPMENT OF AN ONLINE CATALOG SYSTEM FOR AN AUTONOMOUS GUIDED VEHICLE USING XML AND JAVA." University of Cincinnati / OhioLINK, 2001. http://rave.ohiolink.edu/etdc/view?acc_num=ucin990730475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kao, Chung-Chih, and 高崇智. "Defense of Cross-Site Scripting in Client-Side Using Input Validation." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/72294160512978421923.

Full text
Abstract:
碩士<br>中原大學<br>資訊工程研究所<br>97<br>Cross-site scripting is an attack that exploits vulnerabilities of a web application to inject some malicious code or command into a web page. When a user visits the web page, the malicious code would be downloaded to the user’s computer. If the malicious code is executed, it may be used to steal the user’s information or to inject trojan horse or other backdoor programs to the user’s computer. To prevent such attacks, extra modules for input string validation at the server side are needed. This may increase the loading of a server and thus degrades its performance. In this thesis, we perform input string validation at client side, using the same filter pattern of regular expression. It should be able to prevent cross-site scripting attacks without degrading the performance of a server.
APA, Harvard, Vancouver, ISO, and other styles
5

徐宇松. "A Client-side Oriented Whitelist Policy Against Cross-site Scripting Attack and Phishing Attack." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/53757864958987393859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Chien-Hsun, and 王建勳. "A Client/Server Mechanism to against cross site scripting attack." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/4922u2.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊工程系<br>100<br>With the spreading of network and the applying of WEB2.0 technology, the web site has become the most important marketing tools. When the web application developing time is short, the application&apos;s security is ignored easily than past. The web application&apos;s input validation isn&apos;t perfect by developer&apos;s consideration and it became the attacking target of hacker. The common attack is XSS (Cross Site Scripting). Most of XSS Attack is to inject the malicious JavaScript from user&apos;s input. How to judge the user&apos;s input is the important point of defense. This paper proposes a simple detecting mechanism. We use the Client/Server architecture, the web manager just installs the scanning program in web server and we can use the checking process of client for detecting and defensing the XSS attack. The client&apos;s checking mechanism can set at server site or client site. It can deploy the defense mechanism agilely and provide easy and effective protection.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "CLIENT SIDE SCRIPTING"

1

Kindred, Andrew. Mastering ServiceNow Scripting: Leverage JavaScript APIs to perform client-side and server-side scripting on ServiceNow instances. Packt Publishing, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Weaver, James. JavaFX Script: Dynamic Java Scripting for Rich Internet/Client-side Applications. Apress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

JavaFX Script: Dynamic Java Scripting for Rich Internet/Client-side Applications. Apress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "CLIENT SIDE SCRIPTING"

1

Schultz, David, and Craig Cook. "Client-Side Scripting Basics." In Beginning HTML with CSS and XHTML. Apress, 2007. http://dx.doi.org/10.1007/978-1-4302-0350-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cawsey, Alison, and Rick Dewar. "Client-Side Scripting in JavaScript." In Internet Technology and e-Commerce. Macmillan Education UK, 2004. http://dx.doi.org/10.1007/978-1-137-05892-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Meijer, Erik, Daan Leijen, and James Hook. "Client-Side Web Scripting with HaskellScript." In Practical Aspects of Declarative Languages. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49201-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Behfarshad, Zahra, and Ali Mesbah. "Hidden-Web Induced by Client-Side Scripting: An Empirical Study." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39200-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"JavaScript - A Client-Side Scripting Language." In Web Application Design and Implementation. IEEE, 2011. http://dx.doi.org/10.1109/9780470083963.ch14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Shashank, and B. B. Gupta. "BDS." In Handbook of Research on Securing Cloud-Based Databases with Biometric Applications. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6559-0.ch008.

Full text
Abstract:
Cross-Site Scripting (XSS) attack is a vulnerability on the client-side browser that is caused by the improper sanitization of the user input embedded in the Web pages. Researchers in the past had proposed various types of defensive strategies, vulnerability scanners, etc., but still XSS flaws remains in the Web applications due to inadequate understanding and implementation of various defensive tools and strategies. Therefore, in this chapter, the authors propose a security model called Browser Dependent XSS Sanitizer (BDS) on the client-side Web browser for eliminating the effect of XSS vulnerability. Various earlier client-side solutions degrade the performance on the Web browser side. But in this chapter, the authors use a three-step approach to bypass the XSS attack without degrading much of the user's Web browsing experience. While auditing the experiments, this approach is capable of preventing the XSS attacks on various modern Web browsers.
APA, Harvard, Vancouver, ISO, and other styles
7

Gupta, Shashank, and B. B. Gupta. "BDS." In Application Development and Design. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3422-8.ch039.

Full text
Abstract:
Cross-Site Scripting (XSS) attack is a vulnerability on the client-side browser that is caused by the improper sanitization of the user input embedded in the Web pages. Researchers in the past had proposed various types of defensive strategies, vulnerability scanners, etc., but still XSS flaws remains in the Web applications due to inadequate understanding and implementation of various defensive tools and strategies. Therefore, in this chapter, the authors propose a security model called Browser Dependent XSS Sanitizer (BDS) on the client-side Web browser for eliminating the effect of XSS vulnerability. Various earlier client-side solutions degrade the performance on the Web browser side. But in this chapter, the authors use a three-step approach to bypass the XSS attack without degrading much of the user's Web browsing experience. While auditing the experiments, this approach is capable of preventing the XSS attacks on various modern Web browsers.
APA, Harvard, Vancouver, ISO, and other styles
8

Xie, Feng. "Assessing the Benefits of AJAX in Mobile Learning Systems Design." In Innovative Mobile Learning. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-062-2.ch016.

Full text
Abstract:
Mobile technologies are rapidly changing our lives with increasing numbers of services supported by mobile devices, including Web-based learning applications, providing opportunities for people to study anytime and anywhere. However, using Web-based mobile applications to present learning resources is a challenge for developers because the performance of the mobile Internet over GPRS networks is often unacceptably slow. A new Web development model, Ajax, may help to address this problem. Ajax (asynchronous JavaScript and XML), is an approach to Web application development that uses client-side scripting to reduce traffic between client and server and provide a seamless user application experience. In this chapter, we address the question of whether mobile Ajax provides measurable performance advantages over non-Ajax mobile learning applications. An empirical study was undertaken to measure mobile learning application performance over a GPRS network, comparing an Ajax application and an active server pages (ASP) application with identical functionality. Our results suggest that mobile Ajax can reduce the bandwidth requirement by around 70 percent, and cut the server’s response time in half. In addition, these performance improvements were noticed by users in our small group usability test.
APA, Harvard, Vancouver, ISO, and other styles
9

"Web Server Hacking." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch008.

Full text
Abstract:
Organizational web servers reflect the public image of an organization and serve web pages/information to organizational clients via web browsers using HTTP protocol. Some of the web server software may contain web applications that enable users to perform high-level tasks, such as querying a database and delivering the output through the web server to the client browser as an HTML file. Hackers always try to exploit the different vulnerabilities or flaws existing in web servers and web applications, which can pose a big threat for an organization. This chapter provides the importance of protecting web servers and applications along with the different tools used for analyzing the security of web servers and web applications. The chapter also introduces different web attacks that are carried out by an attacker either to gain illegal access to the web server data or reduce the availability of web services. The web server attacks includes denial of service (DOS) attacks, buffer overflow exploits, website defacement with sql injection (SQLi) attacks, cross site scripting (XSS) attacks, remote file inclusion (RFI) attacks, directory traversal attacks, phishing attacks, brute force attacks, source code disclosure attacks, session hijacking, parameter form tampering, man-in-the-middle (MITM) attacks, HTTP response splitting attacks, cross-site request forgery (XSRF), lightweight directory access protocol (LDAP) attacks, and hidden field manipulation attacks. The chapter explains different web server and web application testing tools and vulnerability scanners including Nikto, BurpSuite, Paros, IBM AppScan, Fortify, Accunetix, and ZAP. Finally, the chapter also discusses countermeasures to be implemented while designing any web application for any organization in order to reduce the risk.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "CLIENT SIDE SCRIPTING"

1

Tiwari, Siddharth, Richa Bansal, and Divya Bansal. "Optimized client side solution for cross site scripting." In 2008 16th IEEE International Conference on Networks (ICON). IEEE, 2008. http://dx.doi.org/10.1109/icon.2008.4772647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pazos, Jose Carlos, Jean-Sebastien Legare, and Ivan Beschastnikh. "XSnare: Application-specific client-side cross-site scripting protection." In 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). IEEE, 2021. http://dx.doi.org/10.1109/saner50967.2021.00023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Xuyang, and Mingyang Xu. "Research on Client-side Defense Techniques of Cross-Site Scripting Attack." In 2016 7th International Conference on Education, Management, Computer and Medicine (EMCM 2016). Atlantis Press, 2017. http://dx.doi.org/10.2991/emcm-16.2017.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Blanc, Gregory, Ruo Ando, and Youki Kadobayashi. "Term-Rewriting Deobfuscation for Static Client-Side Scripting Malware Detection." In 2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011). IEEE, 2011. http://dx.doi.org/10.1109/ntms.2011.5720649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Steffens, Marius, Christian Rossow, Martin Johns, and Ben Stock. "Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild." In Network and Distributed System Security Symposium. Internet Society, 2019. http://dx.doi.org/10.14722/ndss.2019.23009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jung Uye Hong, Myoungbeom Chung, and Hyunseung Choo. "Novel bulletin board system based on document object model and client-side scripting for improved interaction." In 2013 International Conference on Information Networking (ICOIN). IEEE, 2013. http://dx.doi.org/10.1109/icoin.2013.6496432.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wong, Nathan, Kevin Gucwa, and Harry H. Cheng. "Web-Based Computing in C/C++." In ASME 2015 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/detc2015-47838.

Full text
Abstract:
An interactive, web-based C/C++ computing environment has been developed to facilitate programming education. An editor with syntax highlighting is provided for students to solve the educational lessons designed to introduce computer programming concepts. The system uses SafeCh, a secure C/C++ interpreter that sandboxes the user to protect against server access, to execute code written by the user. Node.js, a JavaScript framework, is used to interface with SafeCh to redirect user input and output data from client to server and vice versa, creating an interactive programming environment. Users are able to access the learning environment conveniently using any internet-enabled device, including mobile phones and tablets. Most other web-based interactive programming tutorials teach scripting languages such as Python or JavaScript. The few existing web tutorials for C/C++ use server-side compilation and thus lack the same interactivity as is available with this system. Given the increasing popularity of programming education events such as Hour of Code, this web-based computing system can be a simple, interactive method to introduce and teach C/C++.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography