Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
XSS attacks
biblio
XSS Attack Detection Methods Based on XLNet and GRU
Submitted by aekwall on Tue, 04/19/2022 - 11:28am
Data models
internet
deep learning
Training
network security
pubcrawl
Scalability
Resiliency
Human behavior
Stability analysis
Dictionaries
cross-site scripting
text classification
XLNet
XSS attacks
Cross Site Scripting
biblio
XSS Detection Technology Based on LSTM-Attention
Submitted by grigby1 on Wed, 02/10/2021 - 1:21pm
LSTM-attention detection model
XSS attacks
abstract features
added attention mechanism
attention mechanism
context-related features
Cross-site scripting (XSS)
inadequate feature extraction
long short-term memory recurrent neural network
cross-site scripting
malicious attack codes
traditional XSS detection methods
Word2Vec
XSS codes
XSS detection model
XSS detection technology
XSS payload features
Cross Site Scripting
Scalability
learning (artificial intelligence)
security of data
feature extraction
pubcrawl
Human behavior
resilience
Resiliency
robots
deep learning
Data models
internet
recurrent neural nets
pattern classification
Recurrent neural networks
Context modeling
LSTM
biblio
A Practical Exercise System Using Virtual Machines for Learning Cross-Site Scripting Countermeasures
Submitted by grigby1 on Wed, 02/10/2021 - 1:19pm
Resiliency
XSS countermeasures
XSS attacks
Web servers
Web server
Web pages
Web Browser Security
Web browser
web applications
Virtual machining
virtual machines
tools
Software
security of data
Scalability
virtual machine security
resilience
public domain software
pubcrawl
practical exercise system
online front-ends
learning cross-site scripting
internet
Human behavior
cross-site scripting
Cross Site Scripting
computer science education
Browsers
security
virtual machine
biblio
XSS Attack Detection With Machine Learning and n-Gram Methods
Submitted by aekwall on Mon, 12/14/2020 - 12:29pm
Training data
nearest neighbour methods
Predictive Metrics
pubcrawl
Resiliency
security of data
support vector machine
Support vector machines
SVM
Naive Bayes
Uniform resource locators
vulnerable
Web sites
website
XSS attack
XSS attack detection
XSS attacks
KNN
Bayes methods
composability
cookies
Cross Site Scripting
cross-site scripting
detection script
feature extraction
k-nearest neighbour
Attack vectors
learning (artificial intelligence)
machine learning
machine learning algorithms
malicious script
malicious scripts
N-gram
n-gram method
biblio
Cross-Site Scripting for Graphic Data: Vulnerabilities and Prevention
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
Scalability
XSS vulnerabilities
XSS attacks
XSS
XML treatment method
XML
white list.
websites
Web sites
Vulnerability
testing
TES
SVG image
SVG
security of data
Cross Site Scripting
resilience
pubcrawl
malware
Human behavior
graphical content
graphic content
cross-site scripting
Computer graphics
code
Cascading style sheets
black list
attack
animation
Resiliency
biblio
Applications for detecting XSS attacks on different web platforms
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Web browser
Reactive power
Resiliency
security
security flaw
security of data
Site Intermediate Script attacks
visualization
Web application
Rails
Web Browser Security
Web platforms
web security
Web sites
web vulnerabilities
XSS attacks
XSS injection
XSS security
intrusion prevention
Compositionality
C\# languages
dynamic web pages
HTML pages
Human behavior
information security
internet
Intrusion Detection
command injection attacks
Java
malicious code worker
malicious Java Script code
Metrics
Nanoelectromechanical systems
online front-ends
programming languages
pubcrawl
biblio
Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
testing
program testing
programming error
pubcrawl
public domain software
Resiliency
security
security of data
security unit testing approach
program diagnostics
unit test execution framework
Unit testing
untrusted data sanitization
Web Browser Security
Web page context
Web pages
XSS attacks
XSS vulnerability
grammar-based attack generator
Attack generation
automated unit testing
automatic programming
Browsers
cross-site scripting vulnerabilities detection
Data Sanitization
encoder
encoding
Cross Site Scripting
grammars
HTML
Human behavior
injection attacks
Java
Metrics
open source medical records application
program analysis
biblio
Preventing Client Side XSS with Rewrite Based Dynamic Information Flow
Submitted by BrandonB on Tue, 05/05/2015 - 10:49am
Semantics
JavaScript abstract syntax tree
JavaScript code
JSTFlow
online front-ends
performance overhead
rewrite based dynamic information flow
security
security of data
JavaScript
sensitive information leaks
Syntactics
taint engine
taint model
tainted information flow
web applications
XSS attacks
abstract intermediate representation
Java
internet
information security
information flow tracking framework
information flow analysis
fine-grained isolation
Engines
Data models
data flow analysis
cross-site scripting
code rewrite
client side XSS
Browsers
browser proxy
Abstracts
biblio
ETSSDetector: A Tool to Automatically Detect Cross-Site Scripting Vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 10:41am
interactivity
XSS attacks
web applications
vulnerabilities
testing
security of data
security
Qualifications
internet
Browsers
interactive systems
Filling
ETSSDetector
ETSS Detector
Databases
Data mining
cross-site scripting vulnerabilities
cross-site scripting
biblio
A context-sensitive approach for precise detection of cross-site scripting vulnerabilities
Submitted by BrandonB on Tue, 05/05/2015 - 10:41am
precise detection
XSS vulnerability
XSS attacks
Web application
vulnerability detection
taint analysis
standards
source code (software)
source code
software development life cycle
Software
social communication
Servers
sensitive information
security
Browsers
malware
malicious user
malicious operation
invasive software
internet
hypermedia markup languages
HTML
health services
financial transaction
defensive programming based HTML context-sensitive approach
cross-site scripting vulnerability
cross-site scripting
Context