Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
195 | Prithvi Bisht, V. N. Venkatakrishnan |
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 23-43, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Attack Prevention, Security, Filtering, Cross-site scripting (XSS) |
132 | Fangqi Sun, Liang Xu, Zhendong Su 0001 |
Client-Side Detection of XSS Worms by Monitoring Payload Propagation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 539-554, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cross-site scripting worm, client-side detection, Web application security |
112 | Omar Ismail, Masashi Etoh, Youki Kadobayashi, Suguru Yamaguchi |
A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 145-151, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
101 | K. Sivakumar, K. Garg |
Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 277-291, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Secure code, PHP Vulnerabilities, CWE, CVE, Web Security, XSS |
93 | Gary Wassermann, Zhendong Su 0001 |
Static detection of cross-site scripting vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, pp. 171-180, 2008, ACM, 978-1-60558-079-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
static analysis, web applications, cross-site scripting, input validation |
77 | Genta Iha, Hiroshi Doi |
An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 966-971, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
75 | Mike Ter Louw, V. N. Venkatakrishnan |
Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA, pp. 331-346, 2009, IEEE Computer Society, 978-0-7695-3633-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
75 | Martin Johns, Björn Engelmann 0001, Joachim Posegga |
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 335-344, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
75 | Jayamsakthi Shanmugam, M. Ponnavaikko |
A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 861-866, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Application-level web Security, cross-site scripting, security vulnerabilities |
64 | Hristo Bojinov, Elie Bursztein, Dan Boneh |
XCS: cross channel scripting and its impact on web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 420-431, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
embedded web servers, xss, xcs, web security, embedded devices |
64 | Stefan Kals, Engin Kirda, Christopher Krügel, Nenad Jovanovic |
SecuBat: a web vulnerability scanner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 247-256, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
automated vulnerability detection, security, crawling, SQL injection, XSS, cross-site scripting, scanner |
56 | Masaru Takesue |
An HTTP Extension for Secure Transfer of Confidential Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China, pp. 101-108, 2009, IEEE Computer Society, 978-0-7695-3741-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
56 | Siddharth Tiwari, Richa Bansal, Divya Bansal |
Optimized client side solution for cross site scripting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-4, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
56 | Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang |
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 125-129, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Forensics and Evidence, internet attacks, website systems |
56 | Jayamsakthi Shanmugam, M. Ponnavaikko |
Risk Mitigation for Cross Site Scripting Attacks Using Signature Based Model on the Server Side. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS ![In: Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), August 13-15, 2007, The University of Iowa, Iowa City, Iowa, USA, pp. 398-405, 2007, IEEE Computer Society, 0-7695-3039-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Application-level web Security, cross-site scripting, security vulnerabilities |
56 | Giuseppe A. Di Lucca, Anna Rita Fasolino, M. Mastoianni, Porfirio Tramontana |
Identifying Cross Site Scripting Vulnerabilities in Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSE ![In: 6th International Workshop on Web Site Evolution (WSE 2004) - Testing, 11 September 2004, Chicago, IL, USA, pp. 71-80, 2004, IEEE Computer Society, 0-7695-2224-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Daniel Bates, Adam Barth, Collin Jackson |
Regular expressions considered harmful in client-side XSS filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 91-100, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
web, filter, browser, XSS, cross-site scripting |
41 | Davide Alfieri, Massimo Ficco, Michele Mastroianni, Francesco Palmieri 0002 |
XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (5) ![In: Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 5, pp. 317-326, 2024, Springer, 978-3-031-57930-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
41 | Pooja Chaudhary, Brij B. Gupta, Awadhesh Kumar Singh |
XSS Armor: Constructing XSS Defensive Framework for Preserving Big Data Privacy in Internet-of-Things (IoT) Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Circuits Syst. Comput. ![In: J. Circuits Syst. Comput. 31(13), pp. 2250222:1-2250222:24, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
41 | Halil Özgür Baktir |
Web tabanlı uygulamalarda siteler arası betik çalıştırma (XSS) zafiyetinin denetlenmesi için öğrenen bir sistem geliştirilmesi (Developing a learning system for cross-site scripting (XSS) vulnerability in web-based applications) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
41 | Shashank Gupta 0002, Brij Bhooshan Gupta |
XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(17), pp. 3966-3986, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero |
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings, pp. 243-258, 2016, Springer, 978-3-319-33629-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
41 | Sharath Chandra V., S. Selvakumar 0001 |
BIXSAN: browser independent XSS sanitizer for prevention of XSS attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 36(5), pp. 1-7, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
39 | José Fonseca 0002, Marco Vieira, Henrique Madeira |
Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 17-19 December, 2007, Melbourne, Victoria, Australia, pp. 365-372, 2007, IEEE Computer Society, 0-7695-3054-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Adam Barth, Juan Caballero, Dawn Song |
Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA, pp. 360-371, 2009, IEEE Computer Society, 978-0-7695-3633-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Michael D. Ernst |
Automatic creation of SQL Injection and cross-site scripting attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 31st International Conference on Software Engineering, ICSE 2009, May 16-24, 2009, Vancouver, Canada, Proceedings, pp. 199-209, 2009, IEEE, 978-1-4244-3452-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen |
Defending On-Line Web Application Security with User-Behavior Surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 410-415, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Web attacks, Markov model, User behavior, Web security, Web application security |
37 | Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic |
Noxes: a client-side solution for mitigating cross-site scripting attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 330-337, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Alexander Yip, Xi Wang 0005, Nickolai Zeldovich, M. Frans Kaashoek |
Improving application security with data flow assertions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, SOSP 2009, Big Sky, Montana, USA, October 11-14, 2009, pp. 291-304, 2009, ACM, 978-1-60558-752-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
xss, security, privacy, web, python, php, sql injection |
26 | Hossein Saiedian, Dan Broyle |
Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 44(9), pp. 29-36, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Same-origin policy (SOP), Cross-site request forgery (CSRF), Security, Web applications, Web browsers, Cross-site scripting (XSS) |
26 | Terri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji |
SOMA: mutual approval for included content in web pages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 89-98, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cross-site request forgery (XSRF), javascript, web security, cross-site scripting (XSS), same origin policy |
26 | Thorsten Holz, Simon Marechal, Frédéric Raynal |
New Threats and Attacks on the World Wide Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 72-75, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
XSS worms, back doors, attacks, worms, SQL injection, viruses, web application security |
21 | Naresh Kshetri, Dilip Kumar 0003, James Hutson, Navneet Kaur, Omar Faruq Osama |
algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.01012, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Jasleen Kaur, Urvashi Garg, Gourav Bathla |
Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 56(11), pp. 12725-12769, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Isam Kareem Thajeel, Khairulmizam Samsudin, Shaiful Jahari Hashim, Fazirulhisyam Hashim |
Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 35(7), pp. 101628, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Deris Stiawan, Ali Bardadi, Nurul Afifah, Lisa Melinda, Ahmad Heryanto, Tri Wanda Septian, Mohd Yazid Idris, Imam Much Ibnu Subroto, Lukman, Rahmat Budiarto |
An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 46(2), pp. 1759-1774, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Zhonglin Liu, Yong Fang 0002, Cheng Huang 0003, Yijia Xu |
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 124, pp. 103015, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jemin Kim, Joonseok Park |
Enhancing Security of Web-Based IoT Services via XSS Vulnerability Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(23), pp. 9407, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Germán E. Rodríguez, Jenny G. Torres, Eduardo Benavides-Astudillo |
DataCookie: Sorting Cookies Using Data Mining for Prevention of Cross-Site Scripting (XSS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 171-188, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Kento Hasegawa, Seira Hidano, Kazuhide Fukushima |
Automating XSS Vulnerability Testing Using Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023, pp. 70-80, 2023, SciTePress, 978-989-758-624-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Maryam Et-Tolba, Charifa Hanin, Abdelhamid Belmekki |
Intelligent Systems for XSS attack detection: A brief survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: International Wireless Communications and Mobile Computing, IWCMC 2023, Marrakesh, Morocco, June 19-23, 2023, pp. 910-916, 2023, IEEE, 979-8-3503-3339-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Josep Pegueroles Valles, Sebastien Kanj Bongard, Arnau Estebanell Castellví |
XSS Vulnerability Test Enhancement for Progressive Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDF2C (2) ![In: Digital Forensics and Cyber Crime - 14th EAI International Conference, ICDF2C 2023, New York City, NY, USA, November 30, 2023, Proceedings, Part II, pp. 152-163, 2023, Springer, 978-3-031-56582-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Chenyang Ma, Jia Wang, Zongting Li |
Research on xss Detection based on ALSTM Model and Traditional Feature Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCVIT ![In: Proceedings of the 2023 International Conference on Computer, Vision and Intelligent Technology, ICCVIT 2023, Chenzhou, China, August 25-28, 2023, pp. 48:1-48:4, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | He Su, Feng Li, Lili Xu, Wenbo Hu, Yujie Sun, Qing Sun, Huina Chao, Wei Huo |
Splendor: Static Detection of Stored XSS in Modern Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2023, Seattle, WA, USA, July 17-21, 2023, pp. 1043-1054, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Korrawit Santithanmanan, Khwunta Kirimasthong, Tossapon Boongoen |
Machine Learning Based XSS Attacks Detection Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UKCI ![In: Advances in Computational Intelligence Systems - Contributions Presented at the 22nd UK Workshop on Computational Intelligence (UKCI 2023), September 6-8, 2023, Birmingham, UK, pp. 418-429, 2023, Springer, 978-3-031-47507-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Yuki Nakagawa, Mamoru Mimura |
XSS Attack Detection by Attention Mechanism Based on Script Tags in URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings, pp. 562-578, 2023, Springer, 978-981-99-7031-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Neminath Hubballi, Yogendra Singh, Dipin Garg |
XSSMitigate: Deep Packet Inspection based XSS Attack Quarantine in Software Defined Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE ![In: IEEE International Conference on Consumer Electronics, ICCE 2023, Las Vegas, NV, USA, January 6-8, 2023, pp. 1-6, 2023, IEEE, 978-1-6654-9130-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Dragan Korac, Boris Damjanovic, Dejan Simic, Kim-Kwang Raymond Choo |
A hybrid XSS attack (HYXSSA) based on fusion approach: Challenges, threats and implications in cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B), pp. 9284-9300, November 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Lwin Khin Shar, Christopher M. Poskitt, Kyong Jin Shim, Li Ying Leonard Wong |
XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.12416, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Khulud Fisal Alenzi, Onytra Abbas Bashir Abbas |
A Defensive Framework for Reflected XSS in Client-Side Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Web Eng. ![In: J. Web Eng. 21(7), pp. 2209-2230, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Li Chen, Cong Tang, Junjiang He, Hui Zhao 0007, Xiaolong Lan, Tao Li 0016 |
XSS adversarial example attacks based on deep reinforcement learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 120, pp. 102831, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Zhonglin Liu, Yong Fang 0002, Cheng Huang 0003, Jiaxuan Han |
GraphXSS: An efficient XSS payload detection approach based on graph convolutional network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 114, pp. 102597, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Pooja Chaudhary, Brij B. Gupta, Awadhesh Kumar Singh |
Securing heterogeneous embedded devices against XSS attack in intelligent IoT system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 118, pp. 102710, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Qiuhua Wang, Hui Yang, Guohua Wu 0001, Kim-Kwang Raymond Choo, Zheng Zhang, Gongxun Miao, Yizhi Ren |
Black-box adversarial attacks on XSS attack detection model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 113, pp. 102554, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Héloïse Maurel, Santiago A. Vidal, Tamara Rezk |
Statically identifying XSS using deep learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Comput. Program. ![In: Sci. Comput. Program. 219, pp. 102810, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang 0010, Lei Pan 0002, Wei Lou, Kaitai Liang |
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(2), pp. 862-878, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Héloïse Maurel, Santiago A. Vidal, Tamara Rezk |
Comparing the Detection of XSS Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022., pp. 189-201, 2022, SCITEPRESS, 978-989-758-553-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Pooja Chaudhary, Brij B. Gupta, Awadhesh Kumar Singh, Kwok Tai Chui |
Cognitive XSS Defensive Approach to Secure Smart Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE-TW ![In: IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2022, Taipei, Taiwan, July 6-8, 2022, pp. 461-462, 2022, IEEE, 978-1-6654-7050-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Felix Schuckert, Hanno Langweg, Basel Katt |
Systematic Generation of XSS and SQLi Vulnerabilities in PHP as Test Cases for Static Code Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICST Workshops ![In: 15th IEEE International Conference on Software Testing, Verification and Validation Workshops ICST Workshops 2022, Valencia, Spain, April 4-13, 2022, pp. 261-268, 2022, IEEE, 978-1-6654-9628-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Lwin Khin Shar, Christopher M. Poskitt, Kyong Jin Shim, Li Ying Leonard Wong |
XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE (1) ![In: ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8 - 13, 2022, Volume 1, pp. 463-469, 2022, ACM, 978-1-4503-9201-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Waleed Bin Shahid, Baber Aslam, Haider Abbas, Hammad Afzal, Imran Rashid |
An Ensemble Based Deep Learning Framework to Detect and Deceive XSS and SQL Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIIDS (1) ![In: Intelligent Information and Database Systems - 14th Asian Conference, ACIIDS 2022, Ho Chi Minh City, Vietnam, November 28-30, 2022, Proceedings, Part I, pp. 183-195, 2022, Springer, 978-3-031-21742-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Myles Foley, Sergio Maffeis |
Haxss: Hierarchical Reinforcement Learning for XSS Payload Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022, pp. 147-158, 2022, IEEE, 978-1-6654-9425-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Jean Rosemond Dora, Karol Nemoga |
Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. Priv. ![In: J. Cybersecur. Priv. 1(2), pp. 319-339, May 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Souphiane Bensalim, David Klein, Thomas Barber, Martin Johns |
Talking About My Generation: Targeted DOM-based XSS Exploit Generation using Dynamic Data Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSec@EuroSys ![In: EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, Virtual Event / Edinburgh, Scotland, UK, April 26, 2021, pp. 27-33, 2021, ACM, 978-1-4503-8337-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | William Melicher, Clement Fung, Lujo Bauer, Limin Jia 0001 |
Towards a Lightweight, Hybrid Approach for Detecting DOM XSS Vulnerabilities with Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: WWW '21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April 19-23, 2021., pp. 2684-2695, 2021, ACM / IW3C2, 978-1-4503-8312-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Héloïse Maurel, Santiago A. Vidal, Tamara Rezk |
Statically Identifying XSS using Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021., pp. 99-110, 2021, SCITEPRESS, 978-989-758-524-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Yaw Frempong, Yates Snyder, Erfan Al-Hossami, Meera Sridhar, Samira Shaikh |
HIJaX: Human Intent JavaScript XSS Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, July 6-8, 2021., pp. 798-805, 2021, SCITEPRESS, 978-989-758-524-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Malinka Ivanova, Anna Rozeva |
Detection of XSS Attack and Defense of REST Web Service - Machine Learning Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLSC ![In: ICMLSC '21: 2021 The 5th International Conference on Machine Learning and Soft Computing, Da Nang, Vietnam, January 29-31, 2021, pp. 22-28, 2021, ACM, 978-1-4503-8761-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Alexander Boyett, Atef Shalan, Hossain Shahriar, Muhammad Asadur Rahman |
A Taxonomy of XSS Attack Detections in Mobile Environments based on Automation Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: IEEE 45th Annual Computers, Software, and Applications Conference, COMPSAC 2021, Madrid, Spain, July 12-16, 2021, pp. 1339-1344, 2021, IEEE, 978-1-6654-2463-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Pei Wang, Julian Bangert, Christoph Kern |
If It's Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development with API Hardening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 43rd IEEE/ACM International Conference on Software Engineering, ICSE 2021, Madrid, Spain, 22-30 May 2021, pp. 1360-1372, 2021, IEEE, 978-1-6654-4831-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Pooja Chaudhary, Brij B. Gupta, Kwok Tai Chui, Shingo Yamaguchi |
Shielding Smart Home IoT Devices against Adverse Effects of XSS using AI model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCE ![In: IEEE International Conference on Consumer Electronics, ICCE 2021, Las Vegas, NV, USA, January 10-12, 2021, pp. 1-5, 2021, IEEE, 978-1-7281-9766-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Germán E. Rodríguez, Jenny G. Torres, Pamela Flores, Diego E. Benavides |
Cross-site scripting (XSS) attacks and mitigation: A survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 166, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Xueqin Zhang, Yue Zhou, Songwen Pei, Jingjing Zhuge, Jiahao Chen 0004 |
Adversarial Examples Detection for XSS Attacks Based on Generative Adversarial Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 10989-10996, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Fawaz Mahiuob Mohammed Mokbal, Dan Wang, Xiaoxi Wang, Lihua Fu |
Data augmentation-based conditional Wasserstein generative adversarial network-gradient penalty for XSS attack detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PeerJ Comput. Sci. ![In: PeerJ Comput. Sci. 6, pp. e328, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Brij B. Gupta, Pooja Chaudhary, Shashank Gupta 0002 |
Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Organ. End User Comput. ![In: J. Organ. End User Comput. 32(4), pp. 85-111, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Antonín Steinhauser, Petr Tuma 0001 |
Database Traffic Interception for Graybox Detection of Stored and Context-Sensitive XSS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.03322, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | José Carlos Pazos, Jean-Sébastien Légaré, Ivan Beschastnikh, William Aiello |
Precise XSS detection and mitigation with Client-side Templates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.07826, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | Usama Khalid, Muhammad Abdullah, Kashif Inayat |
A Novel Framework for Detection and Prevention of JavaScript-XSS Attacks in Android based Hybrid Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.07350, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | Antonín Steinhauser, Petr Tuma 0001 |
DjangoChecker: Applying Extended Taint Tracking and Server Side Parsing for Detection of Context-Sensitive XSS Flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.06990, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | Jun-Ming Gan, Hang-Yek Ling, Yu-Beng Leau |
A Review on Detection of Cross-Site Scripting Attacks (XSS) in Web Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACeS ![In: Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers, pp. 685-709, 2020, Springer, 978-981-33-6834-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura |
XSS Vulnerabilities in Cloud-Application Add-Ons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020, pp. 610-621, 2020, ACM, 978-1-4503-6750-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad Qbea'h, Saed Alrabaee, Djedjiga Mouheb |
An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020., pp. 603-610, 2020, SCITEPRESS, 978-989-758-399-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Xinran Li, Wenxing Ma, Zan Zhou 0001, Changqiao Xu |
XSS Attack Detection Model Based on Semi-supervised Learning Algorithm with Weighted Neighbor Purity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHOC-NOW ![In: Ad-Hoc, Mobile, and Wireless Networks - 19th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2020, Bari, Italy, October 19-21, 2020, Proceedings, pp. 198-213, 2020, Springer, 978-3-030-61745-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Yanpeng Cui, Junjie Cui, Jianwei Hu 0002 |
A Survey on XSS Attack Detection and Prevention in Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLC ![In: ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, Shenzhen, China, February 15-17, 2020, pp. 443-449, 2020, ACM, 978-1-4503-7642-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Li Lei, Ming Chen, Chengwan He, Duojiao Li |
XSS Detection Technology Based on LSTM-Attention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRC ![In: 5th International Conference on Control, Robotics and Cybernetics, CRC 2020, Wuhan, China, October 16-18, 2020, pp. 175-180, 2020, IEEE, 978-1-7281-8624-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Ahmet Salih Buyukkayhan, Can Gemicioglu, Tobias Lauinger, Alina Oprea, William Robertson 0002, Engin Kirda |
What's in an Exploit? An Empirical Analysis of Reflected Server XSS Exploitation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: 23rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2020, San Sebastian, Spain, October 14-15, 2020, pp. 107-120, 2020, USENIX Association, 978-1-939133-18-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | Pooja Chaudhary, Brij Bhooshan Gupta, Chang Choi, Kwok Tai Chui |
XSSPro: XSS Attack Detection Proxy to Defend Social Networking Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSoNet ![In: Computational Data and Social Networks - 9th International Conference, CSoNet 2020, Dallas, TX, USA, December 11-13, 2020, Proceedings, pp. 411-422, 2020, Springer, 978-3-030-66045-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Karthik Anagandula, Pavol Zavarsky |
An Analysis of Effectiveness of Black-Box Web Application Scanners in Detection of Stored SQL Injection and Stored XSS Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIS ![In: 3rd International Conference on Data Intelligence and Security, ICDIS 2020, South Padre Island, TX, USA, June 24-26, 2020, pp. 40-48, 2020, IEEE, 978-1-7281-9379-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Muath Obaidat, Joseph Brown, Abdullah Al Hayajneh |
Web Browser Extension User-Script XSS Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC/PiCom/CBDCom/CyberSciTech ![In: IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22, 2020, pp. 316-321, 2020, IEEE, 978-1-7281-6609-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Yong Fang 0002, Cheng Huang 0003, Yijia Xu, Yang Li |
RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 11(8), pp. 177, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Shashank Gupta 0002, Monika Sharma, Dhrub Kumar |
SEC-H5: Secure and efficient integration of settings of enhanced HTML5 XSS vector defensive framework on edge network of fog nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 31(17), 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Shashank Gupta 0002, Brij B. Gupta, Pooja Chaudhary |
A client-server JavaScript code rewriting-based framework to detect the XSS worms from online social network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 31(21), 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Pooja Chaudhary, Brij B. Gupta, Shashank Gupta 0002 |
A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Technol. Web Eng. ![In: Int. J. Inf. Technol. Web Eng. 14(1), pp. 85-111, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Shashank Gupta 0002, Brij B. Gupta |
Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 10(11), pp. 4377-4405, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Miao Liu 0005, Boyu Zhang, Wenbin Chen 0003, Xunlai Zhang |
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 182004-182016, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Fawaz Mahiuob Mohammed Mokbal, Dan Wang, Azhar Imran, Jiuchuan Lin, Faheem Akhtar, Xiaoxi Wang |
MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 100567-100580, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Thanh Bui, Siddharth Prakash Rao, Markku Antikainen, Tuomas Aura |
XSS Vulnerabilities in Cloud-Application Add-Ons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1911.12332, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
21 | Yun Zhou 0001, Peichao Wang |
An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 82, pp. 261-269, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Antonín Steinhauser, Petr Tuma 0001 |
DjangoChecker: Applying extended taint tracking and server side parsing for detection of context-sensitive XSS flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Pract. Exp. ![In: Softw. Pract. Exp. 49(1), pp. 130-148, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Boyu Zhang |
Detecting XSS attacks by combining CNN with LSTM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
DOI RDF |
|