$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[해외논문] A Study on XSS Attacks: Intelligent Detection Methods 원문보기

Journal of physics. Conference series, v.1767 no.1, 2021년, pp.012047 -   

Stency, V S ,  Mohanasundaram, N

Abstract AI-Helper 아이콘AI-Helper

AbstractCross-site scripting is one of the standard web application attacks vulnerable to the application layer. The attacker handles malicious scripting for trusted websites and inject the script. There are numerous types of XSS scripting vulnerable to attack websites incredibly open web applicatio...

참고문헌 (35)

  1. Cities Saborido 101 2020 10.1016/j.cities.2020.102690 Software systems from smart city vendors 

  2. Technological Forecasting and Social Change Kahle 156 2020 10.1016/j.techfore.2020.120024 Smart Products value creation in SMEs innovation ecosystems 

  3. International Journal of Information Management Chen 51 2020 10.1016/j.ijinfomgt.2019.10.007 A symbolic interactionism perspective of using social media for personal and business communication 

  4. Computers in Human Behavior Molinillo 108 2020 10.1016/j.chb.2019.04.004 Analyzing the effect of social support and community factors on customer engagement and its impact on loyalty behaviors toward social commerce websites 

  5. Journal of Retailing and Consumer Services Rese 56 2020 10.1016/j.jretconser.2020.102176 Chatbots in retailers’ customer communication: How to measure their acceptance? 

  6. Robotics and Computer-Integrated Manufacturing Barenji 67 2020 Toward blockchain and fog computing collaborative design and manufacturing platform: Support customer view 

  7. Shokouhyar 2020 Toward Consumer perception of cellphones sustainability: A Social media analytics 

  8. Wei 2020 Information sharing and sales patterns choice in a supply chain with product’s greening improvement 

  9. Paschen 2020 10.1016/j.bushor.2020.01.003 Collaborative intelligence: How human and artificial intelligence create value along the B2B sales funnel 

  10. Network Security Nguyen 2019 11 2019 10.1016/S1353-4858(19)30061-3 Web attacks: defeating monetisation attempts 

  11. Mansoori 2020 How Do They Find Us? A Study of Geolocation Tracking Techniques of Malicious Websites 

  12. Liang 80 2017 Anomaly-based web attack detection: a deep learning approach 

  13. Expert Systems with Applications Chiew 106 1 2018 10.1016/j.eswa.2018.03.050 A survey of phishing attacks: Their types, vectors and technical approaches 

  14. Procedia Computer Science Marashdih 124 647 2017 10.1016/j.procs.2017.12.201 Cross site scripting: removing approaches in web application 

  15. Computer Networks Rodriguez 166 2020 10.1016/j.comnet.2019.106960 Cross-site scripting (XSS) attacks and mitigation: A survey 

  16. Journal of Network and Computer Applications Sarmah 118 113 2018 10.1016/j.jnca.2018.06.004 A survey of detection methods for XSS attacks 

  17. Information and Software Technology Hydara 58 170 2015 10.1016/j.infsof.2014.07.010 Current state of research on cross-site scripting (XSS)-A systematic literature review 

  18. Cui 443 2020 A Survey on XSS Attack Detection and Prevention in Web Applications 

  19. IEEE Access Liu 7 2019 10.1109/ACCESS.2019.2960449 A Survey of Exploitation and Detection Methods of XSS Vulnerabilities 

  20. IEEE transactions on information forensics and security Faghani 8 1815 2013 10.1109/TIFS.2013.2280884 A study of XSS worm propagation and detection mechanisms in online social networks 

  21. Electronic Notes in Theoretical Computer Science Salas 302 133 2014 10.1016/j.entcs.2014.01.024 Security testing methodology for vulnerabilities detection of xss in web services and ws-security 

  22. Procedia Computer Science Gupta 78 82 2016 10.1016/j.procs.2016.02.014 Automated discovery of JavaScript code injection attacks in PHP web applications 

  23. Procedia Computer Science Gupta 85 198 2016 10.1016/j.procs.2016.05.211 CSSXC: Context-sensitive sanitization framework for Web applications against XSS vulnerabilities in cloud environments 

  24. Procedia Computer Science Kaur 125 669 2018 10.1016/j.procs.2017.12.086 Efficient yet robust elimination of XSS attack vectors from HTML5 web applications hosted on OSN-based cloud platforms 

  25. Procedia Technology Gupta 24 1595 2016 10.1016/j.protcy.2016.05.152 Enhanced XSS defensive framework for web applications deployed in the virtual machines of cloud computing environment 

  26. Steinhauser 2020 

  27. IEEE Access Yang 7 29891 2019 10.1109/ACCESS.2019.2895751 Detecting malicious urls via a keyword-based convolutional gated-recurrent-unit neural network 

  28. IEEE Access Mokbal 7 2019 10.1109/ACCESS.2019.2927417 MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique 

  29. IEEE Access Abaimov 7 2019 10.1109/ACCESS.2019.2939870 CODDLE: Code-injection detection with deep learning 

  30. IEEE Access Zhang 8 10989 2020 10.1109/ACCESS.2020.2965184 Adversarial Examples Detection for XSS Attacks Based on Generative Adversarial Networks 

  31. Fang 47 2018 DeepXSS: Cross site scripting detection based on deep learning 

  32. Future Generation Computer Systems Gupta 79 319 2018 10.1016/j.future.2017.05.038 Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network 

  33. IET software Shar 6 377 2012 10.1049/iet-sen.2011.0084 Auditing the XSS defence features implemented in web application programs 

  34. Journal of Parallel and Distributed Computing Wang 118 100 2018 10.1016/j.jpdc.2017.07.006 TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting 

  35. Computers & Security Zhou 82 261 2019 10.1016/j.cose.2018.12.016 An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence 

관련 콘텐츠

오픈액세스(OA) 유형

GOLD

오픈액세스 학술지에 출판된 논문

저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로