Journal articles on the topic 'XSS attacks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'XSS attacks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Khamdamov, Rustam, and Komil Kerimov. "MATHEMATICAL ALGORITHM FOR DETECTING XSS ATTACKS ON WEB APPLICATIONS." Journal of Automation and Information sciences 3 (May 1, 2021): 73–77. http://dx.doi.org/10.34229/1028-0979-2021-3-6.
Full textRevyakina, Yelena, Larissa Cherckesova, Olga Safaryan, Denis Korochentsev, Nikolay Boldyrikhin, and Yuri Ivanov. "Possibilities of conducting XSS-attacks and the development of countermeasures." E3S Web of Conferences 224 (2020): 01040. http://dx.doi.org/10.1051/e3sconf/202022401040.
Full textHartono and Sriyanto. "XSS Attack Detection and Mitigation Using Multi-Layer Security Mechanism (MLSM)." Sienna 3, no. 2 (2022): 1–14. http://dx.doi.org/10.47637/sienna.v3i2.669.
Full textNagarjun, PMD, and Shaik Shakeel Ahamad. "ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting attacks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 2 (2019): 1393–98. https://doi.org/10.11591/ijece.v9i2.pp1393-1398.
Full textNagarjun, PMD, and Shaik Shakeel Ahamad. "ImageSubXSS: an image substitute technique to prevent Cross-Site Scripting attacks." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 2 (2019): 1393. http://dx.doi.org/10.11591/ijece.v9i2.pp1393-1398.
Full textGupta, Neha. "XSS Defense: An Approach for Detecting and Preventing Cross Site Scripting Attacks." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 03 (2015): 1564–71. https://doi.org/10.5281/zenodo.14770771.
Full textAliga, Aliga Paul, Adetokunbo MacGregor John-Otumu, Rebecca E. Imhanhahimi, and Atuegbelo Confidence Akpe. "Cross Site Scripting Attacks in Web-Based Applications." Journal of Advances in Science and Engineering 1, no. 2 (2018): 25–35. http://dx.doi.org/10.37121/jase.v1i2.19.
Full textKhazal, Iman, and Mohammed Hussain. "Server Side Method to Detect and Prevent Stored XSS Attack." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (2021): 58–65. http://dx.doi.org/10.37917/ijeee.17.2.8.
Full textMokbal, Fawaz Mahiuob Mohammed, Dan Wang, Xiaoxi Wang, and Lihua Fu. "Data augmentation-based conditional Wasserstein generative adversarial network-gradient penalty for XSS attack detection system." PeerJ Computer Science 6 (December 14, 2020): e328. http://dx.doi.org/10.7717/peerj-cs.328.
Full textZhou, Yuan, Enze Wang, Wantong Yang, et al. "XSShield: Defending Against Stored XSS Attacks Using LLM-Based Semantic Understanding." Applied Sciences 15, no. 6 (2025): 3348. https://doi.org/10.3390/app15063348.
Full textKerimov, Komil Fikratovich, and Zarina Ildarovna Azizova. "Development of Mathematical Algorithm for Detecting XSS Attacks on Web Applications." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 21 (November 5, 2024): 509–13. http://dx.doi.org/10.37394/23209.2024.21.46.
Full textWibowo, Ripto Mukti, and Aruji Sulaksono. "Web Vulnerability Through Cross Site Scripting (XSS) Detection with OWASP Security Shepherd." Indonesian Journal of Information Systems 3, no. 2 (2021): 149. http://dx.doi.org/10.24002/ijis.v3i2.4192.
Full textHu, Ze, Jianwei Zhang, and Hongyu Yang. "XSS Attack Detection Based on Multisource Semantic Feature Fusion." Electronics 14, no. 6 (2025): 1174. https://doi.org/10.3390/electronics14061174.
Full textGupta, Charu, Rakesh Kumar Singh, and Amar Kumar Mohapatra. "GeneMiner: A Classification Approach for Detection of XSS Attacks on Web Services." Computational Intelligence and Neuroscience 2022 (June 25, 2022): 1–12. http://dx.doi.org/10.1155/2022/3675821.
Full textNagaraju, Dr R. "XSS Attack Detection using Machine Learning Algorithms." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 12 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem27487.
Full textWang, Qiuhua, Hui Yang, Guohua Wu, et al. "Black-box adversarial attacks on XSS attack detection model." Computers & Security 113 (February 2022): 102554. http://dx.doi.org/10.1016/j.cose.2021.102554.
Full textMaruf Hassan, Md, Badlishah R. Ahmad, Ashrafia Esha, Rafika Risha, and Mohammad S. Hasan. "Important factors to remember when constructing a cross-site scripting prevention mechanism." Bulletin of Electrical Engineering and Informatics 11, no. 2 (2022): 965–73. http://dx.doi.org/10.11591/eei.v11i2.3557.
Full textMd., Maruf Hassan, R. Ahmad Badlishah, Esha Ashrafia, Risha Rafika, and S. Hasan Mohammad. "Important factors to remember when constructing a cross-site scripting prevention mechanism." Bulletin of Electrical Engineering and Informatics 11, no. 2 (2022): 965~973. https://doi.org/10.11591/eei.v11i2.3557.
Full textGupta, Punit, and Pallavi Kaliyar. "History Aware Anomaly Based IDS for Cloud IaaS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 6 (2013): 1779–84. http://dx.doi.org/10.24297/ijct.v10i6.3205.
Full textPrabhaswara, Ilham Yoga, I. Made Agus Dwi Suarjaya, and Ni Kadek Dwi Rusjayanthi. "Pengembangan Engine Web Crawler Sebagai Pencari Jejak Serangan Cyber Stored Cross-Site Scripting." JITTER : Jurnal Ilmiah Teknologi dan Komputer 4, no. 2 (2023): 1880. http://dx.doi.org/10.24843/jtrti.2023.v04.i02.p20.
Full textDeshbhratar, Meena, and Anurag Srivastava. "HANDLING VULNERABLE SCRIPT CODE IN WEB ENGINEERING." INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES 9, no. 2 (2021): 01–04. http://dx.doi.org/10.55083/irjeas.2021.v09i02001.
Full textDr., AMMAR ALDALLAL, and KASHIF SHABBIR Dr. "Protecting Web Applications from Cross-Site Scripting Attacks." JOURNAL OF APPLIED ENGINEERING RESEARCH 2017, no. 03 (2017): 18. https://doi.org/10.5281/zenodo.849089.
Full textPrajapati, Abhishek, Kunal Thakur, Abhishek Kumar, Shirish Patil, and Vijaya Patil. "Crosscan: reflected xss scannera website to scan for reflected xss vulnerabilities." International Journal of Advanced Research 13, no. 05 (2025): 45–49. https://doi.org/10.21474/ijar01/20875.
Full textAlisultanova, Iman A., and Deni M. Islamov. "ANALYSIS OF CROSS-SITE SCRIPTING VULNERABILITIES AND METHODS OF THEIR ELIMINATION." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 3/10, no. 156 (2025): 174–81. https://doi.org/10.36871/ek.up.p.r.2025.03.10.023.
Full textShahriar, Hossain, Sarah North, Wei-Chuen Chen, and Edward Mawangi. "Information Theoretic XSS Attack Detection in Web Applications." International Journal of Secure Software Engineering 5, no. 3 (2014): 1–15. http://dx.doi.org/10.4018/ijsse.2014070101.
Full textHartono, Hartono, Ryan Aji Wijaya, and Khusnul Khotimah. "Development of Detection and Mitigation of Advanced Persistent Threats Using Artificial Intelligence and Multi-Layer Security on Cloud Computing Infrastructure." International Journal of Artificial Intelligence Research 8, no. 2 (2024): 194. http://dx.doi.org/10.29099/ijair.v8i2.1250.
Full textFang, Yong, Cheng Huang, Yijia Xu, and Yang Li. "RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning." Future Internet 11, no. 8 (2019): 177. http://dx.doi.org/10.3390/fi11080177.
Full textPrasetio, Dimaz Arno, Kusrini Kusrini, and M. Rudyanto Arief. "Cross-site Scripting Attack Detection Using Machine Learning with Hybrid Features." JURNAL INFOTEL 13, no. 1 (2021): 1–6. http://dx.doi.org/10.20895/infotel.v13i1.606.
Full textFarane Shradha, Gotane Rutuja, Chandanshive Sakshi, Agrawal Khushi, and Khandekar Srushti. "Detection of cyber-attacks and network attacks using Machine Learning." World Journal of Advanced Engineering Technology and Sciences 12, no. 1 (2024): 128–32. http://dx.doi.org/10.30574/wjaets.2024.12.1.0184.
Full textLesko, S. A. "Models and scenarios of implementation of threats for internet resources." Russian Technological Journal 8, no. 6 (2020): 9–33. http://dx.doi.org/10.32362/2500-316x-2020-8-6-9-33.
Full textWang, Yi-Hsun, Ching-Hao Mao, and Hahn-Ming Lee. "Structural Learning of Attack Vectors for Generating Mutated XSS Attacks." Electronic Proceedings in Theoretical Computer Science 35 (September 17, 2010): 15–26. http://dx.doi.org/10.4204/eptcs.35.2.
Full textDora, Jean Rosemond, and Karol Nemoga. "Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity." Journal of Cybersecurity and Privacy 1, no. 2 (2021): 319–39. http://dx.doi.org/10.3390/jcp1020018.
Full textAlJamal, Mahmoud, Rabee Alquran, Ayoub Alsarhan, et al. "A Robust Machine Learning Model for Detecting XSS Attacks on IoT over 5G Networks." Future Internet 16, no. 12 (2024): 482. https://doi.org/10.3390/fi16120482.
Full textChaudhary, Pooja, B. B. Gupta, and Shashank Gupta. "A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network." International Journal of Information Technology and Web Engineering 14, no. 1 (2019): 85–111. http://dx.doi.org/10.4018/ijitwe.2019010105.
Full textBrahmasani, Siva, Subramanian Selvakumar, and E. Sivasankar. "Prevention of XSS attacks using STCD." ACM SIGSOFT Software Engineering Notes 38, no. 1 (2013): 46–49. http://dx.doi.org/10.1145/2413038.2382768.
Full textBrahmasani, Siva, Subramanian Selvakumar, and E. Sivasankar. "Prevention of XSS attacks using STCD." ACM SIGSOFT Software Engineering Notes 37, no. 6 (2012): 1–9. http://dx.doi.org/10.1145/2382756.2382768.
Full textKadhim, Raed Waheed, and Methaq Talib Gaata. "A hybrid of CNN and LSTM methods for securing web application against cross-site scripting attack." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (2021): 1022–29. https://doi.org/10.11591/ijeecs.v21.i2.pp1022-1029.
Full textGunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik, and Nanang Ismail. "Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.
Full textTeddy, Surya Gunawan, Kasim Lim Muhammad, Kartiwi Mira, Abdul Malik Noreha, and Ismail Nanang. "Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (2018): 729–37. https://doi.org/10.11591/ijeecs.v12.i2.pp729-737.
Full textNagar, Nitin, and Ugrasen Suman. "Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from XSS Attack." International Journal of Cloud Applications and Computing 6, no. 1 (2016): 1–14. http://dx.doi.org/10.4018/ijcac.2016010101.
Full textHamzah, Khairatun Hisan, Mohd Zamri Osman, Tumusiime Anthony, Mohd Arfian Ismail, Zubaile Abdullah, and Alde Alanda. "Comparative Analysis of Machine Learning Algorithms for Cross-Site Scripting (XSS) Attack Detection." JOIV : International Journal on Informatics Visualization 8, no. 3-2 (2024): 1678. https://doi.org/10.62527/joiv.8.3-2.3451.
Full textAnnas, Muhammad, Rizal Tjut Adek, and Yesy Afrillia. "Web Application Firewall (WAF) Design to Detect and Anticipate Hacking in Web-Based Applications." Journal of Advanced Computer Knowledge and Algorithms 1, no. 3 (2024): 52. http://dx.doi.org/10.29103/jacka.v1i3.16315.
Full textXu, Hua Jie, Xiao Ming Hu, and Dong Dong Zhang. "A XSS Defensive Scheme Based on Behavior Certification." Applied Mechanics and Materials 241-244 (December 2012): 2365–69. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2365.
Full textAlhamyani, Rahmah, and Majid Alshammari. "Machine Learning-Driven Detection of Cross-Site Scripting Attacks." Information 15, no. 7 (2024): 420. http://dx.doi.org/10.3390/info15070420.
Full textSalama, A. A., El-Said F. Aboelfotoh, Huda E. Khalid, Ahmed K. Essa, Hazem M. El-Bakry, and Doaa S. El-Morshedy. "Integrating Neutrosophic Logic with ASP.NET to Prevent XSS Attacks." Neutrosophic Optimization and Intelligent Systems 5 (January 6, 2025): 14–28. https://doi.org/10.61356/j.nois.2025.5455.
Full textOkhonko Pylyp. "Analysis of Vulnerabilities in The Content Security Policy Standard to Enhance Website Security." International Journal of Engineering and Computer Science 13, no. 12 (2024): 26677–81. https://doi.org/10.18535/ijecs/v13i12.4948.
Full textVamsi, Mohan, and Sandeep Malik Dr. "Secure Web Applications Against Cross Site Scripting XSS A Review." International Journal of Trend in Scientific Research and Development 2, no. 1 (2017): 900–903. https://doi.org/10.31142/ijtsrd7135.
Full textLu, Jiazhong, Zhitan Wei, Zhi Qin, Yan Chang, and Shibin Zhang. "Resolving Cross-Site Scripting Attacks through Fusion Verification and Machine Learning." Mathematics 10, no. 20 (2022): 3787. http://dx.doi.org/10.3390/math10203787.
Full textZhao, Chunhui, Shuaijie Si, Tengfei Tu, Yijie Shi, and Sujuan Qin. "Deep-Learning Based Injection Attacks Detection Method for HTTP." Mathematics 10, no. 16 (2022): 2914. http://dx.doi.org/10.3390/math10162914.
Full textKela, Rushabh, Abhinav Chawla, Pratishtha Gaur, and Dr Manikandan K. "IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS." international journal of advanced research in computer science 13, no. 4 (2022): 28–34. http://dx.doi.org/10.26483/ijarcs.v13i4.6890.
Full text