咨询与建议

限定检索结果

文献类型

  • 25 篇 会议
  • 10 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 36 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 33 篇 计算机科学与技术...
    • 8 篇 电气工程
    • 5 篇 信息与通信工程
    • 4 篇 网络空间安全
    • 3 篇 软件工程
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 36 篇 web vulnerabilit...
  • 8 篇 web security
  • 5 篇 deep learning
  • 5 篇 machine learning
  • 3 篇 computer securit...
  • 3 篇 information flow
  • 3 篇 xss
  • 3 篇 web attacks
  • 3 篇 web application ...
  • 3 篇 cross-site scrip...
  • 2 篇 intrusion detect...
  • 2 篇 security scanner...
  • 2 篇 search engine sp...
  • 2 篇 attack detection
  • 2 篇 semantic web
  • 2 篇 web applications
  • 2 篇 malicious links
  • 2 篇 cyber-security
  • 2 篇 cybersecurity
  • 2 篇 security

机构

  • 2 篇 univ complutense...
  • 1 篇 int islamic univ...
  • 1 篇 shaqra univ durm...
  • 1 篇 univ prishtina f...
  • 1 篇 southwest jiaoto...
  • 1 篇 natl inst techno...
  • 1 篇 sidi mohamed ben...
  • 1 篇 king abdulaziz c...
  • 1 篇 nit trichy tiruc...
  • 1 篇 northeastern uni...
  • 1 篇 internet commerc...
  • 1 篇 univ toulouse la...
  • 1 篇 taif univ coll c...
  • 1 篇 department of in...
  • 1 篇 int islamic univ...
  • 1 篇 thompson rivers ...
  • 1 篇 amrita school of...
  • 1 篇 univ mohamed bou...
  • 1 篇 univ windsor sch...
  • 1 篇 kulliyyah of inf...

作者

  • 3 篇 garcia villalba ...
  • 3 篇 roman munoz fern...
  • 2 篇 iqbal muhammad
  • 1 篇 philippaerts pie...
  • 1 篇 elmiligi haytham
  • 1 篇 watters paul
  • 1 篇 oprea alina
  • 1 篇 imeraj dren
  • 1 篇 nfaoui el habib
  • 1 篇 alarifi abdulrah...
  • 1 篇 štangler jan
  • 1 篇 rrmoku korab
  • 1 篇 guerra barretto ...
  • 1 篇 groddeck alexand...
  • 1 篇 pathan al-sakib ...
  • 1 篇 saad sherif
  • 1 篇 guclu sebahattin
  • 1 篇 bathla gourav
  • 1 篇 alorainy wafa
  • 1 篇 dessiatnikoff a.

语言

  • 32 篇 英文
  • 2 篇 其他
  • 1 篇 土耳其文
  • 1 篇 中文
检索条件"主题词=Web vulnerabilities"
36 条 记 录,以下是1-10 订阅
排序:
An algorithm to find relationships between web vulnerabilities
收藏 引用
JOURNAL OF SUPERCOMPUTING 2018年 第3期74卷 1061-1089页
作者: Roman Munoz, Fernando Garcia Villalba, Luis Javier Univ Complutense Madrid Fac Informat Technol & Comp Sci Dept Software Engn & Artificial Intelligence DISI GASS Calle Prof Jose Garcia Santesmases9Ciudad Univ E-28040 Madrid Spain
Over the past years, there has been a high increase in web sites using cloud computing. Like usual web site, those web applications can have most of the common web vulnerabilities, like SQL injection or cross-site scr... 详细信息
来源: 评论
A Survey on Detection and Prevention of web vulnerabilities
收藏 引用
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 2020年 第6期11卷 521-540页
作者: Noman, Muhammad Iqbal, Muhammad Manzoor, Amir Bahria Univ Dept Comp Sci Karachi Campus Karachi Pakistan Southwest Jiaotong Univ Sch Informat Sci & Technol Chengdu Peoples R China Bahria Univ Dept Management Sci Karachi Pakistan
The Internet provides a vast range of benefits to society and empowers the users in a variety of ways to use web applications. Simply, the internet has become the most transformative and fast-growing technology ever b... 详细信息
来源: 评论
Predicting web vulnerabilities in web Applications Based on Machine Learning  1
收藏 引用
1st International Conference on Intelligent Technologies and Applications (INTAP)
作者: Khalid, Muhammad Noman Farooq, Humera Iqbal, Muhammad Alam, Muhammad Talha Rasheed, Kamran Bahria Univ Karachi Campus Karachi Pakistan
Building a secure website is time-consuming, expensive and challenging task for web developers. Researchers to identify webpage sinks to address security efforts, as it helps to reduce time and money to secure web app... 详细信息
来源: 评论
A clustering approach for web vulnerabilities detection
A clustering approach for web vulnerabilities detection
收藏 引用
17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC)
作者: Dessiatnikoff, A. Akrout, R. Alata, E. Kaaniche, M. Nicomette, V. CNRS LAAS 7 Ave Colonel Roche F-31077 Toulouse France Univ Toulouse LAAS INSA ISAE F-31077 Toulouse France
This paper presents a new algorithm aimed at the vulnerability assessment of web applications following a black-box approach. The objective is to improve the detection efficiency of existing vulnerability scanners and... 详细信息
来源: 评论
Impact of secure programming on web application vulnerabilities
Impact of secure programming on web application vulnerabilit...
收藏 引用
IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS)
作者: Rexha, Blerim Halili, Arbnor Rrmoku, Korab Imeraj, Dren Univ Prishtina Fac Elect & Comp Engn Prishtina Kosovo
Nowadays all organizations tend to shift their daily business processes into web. This shifting requires from web developer's detailed knowledge about security techniques, such as Structured Query Language (SQL) i... 详细信息
来源: 评论
Unveiling XSS Threats: A Bipartite Graph Approach with Ensemble Deep Learning for Enhanced Detection
收藏 引用
INFORMATION 2025年 第2期16卷 97-97页
作者: Alorainy, Wafa Shaqra Univ Durma Coll Sci & Humanities Shaqra 11961 Saudi Arabia
Cross-Site Scripting (XSS) attacks are a common source of vulnerability for web applications, necessitating scalable mechanisms for detection. In this work, a new method based on bipartite graph-based feature extracti... 详细信息
来源: 评论
web Vulnerability Scanner  5th
Web Vulnerability Scanner
收藏 引用
5th International Conference on Advances in Information Communication Technology and Computing, AICTC 2024
作者: Kumaran, U. Sree, Pothireddy Sneha Udaya Sree, S. Sowgandhi, Vadlamudi Krishna Balasubramanian, Sundaravadivazhagn Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India University of Technology and Applied Sciences Al Mussanah Oman
A web vulnerabilities Scanner scans the website’s web pages for comprehensive vulnerabilities. The recently constructed web application is a dynamic site that necessitates frequent changes for both clients and the de... 详细信息
来源: 评论
Analyzing the traffic of penetration testing tools with an IDS
收藏 引用
JOURNAL OF SUPERCOMPUTING 2018年 第12期74卷 6454-6469页
作者: Roman Munoz, Fernando Armas Vega, Esteban Alejandro Garcia Villalba, Luis Javier Univ Complutense Madrid Fac Comp Sci & Engn Dept Software Engn & Artificial Intelligence DISI Grp Anal Secur & Syst Off 431Calle Prof Jose Garcia Santesmases 9 E-28040 Madrid Spain
Many papers have been published comparing the accuracy of automated tools in looking for vulnerabilities in web applications. In those previous studies the researchers analyze vulnerable web applications with pentesti... 详细信息
来源: 评论
Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review
收藏 引用
ARTIFICIAL INTELLIGENCE REVIEW 2023年 第11期56卷 12725-12769页
作者: Kaur, Jasleen Garg, Urvashi Bathla, Gourav Chandigarh Univ Ajitgarh Punjab India Univ Petr & Energy Studies Dehra Dun India
With the rising demand for E-commerce, Social Networking websites, it has become essential to develop security protocols over the World Wide web that can provide security and privacy to Internet users all over the glo... 详细信息
来源: 评论
Enlargement of vulnerable web applications for testing
收藏 引用
JOURNAL OF SUPERCOMPUTING 2018年 第12期74卷 6598-6617页
作者: Roman Munoz, Fernando Sabido Cortes, Ivan Israel Garcia Villalba, Luis Javier Univ Complutense Madrid Fac Comp Sci & Engn Dept Software Engn & Artificial Intelligence DISI Grp Anal Secur & Syst Off 431Calle Prof Jose Garcia Santesmases 9 E-28040 Madrid Spain
There are two main kinds of vulnerable web applications, usual applications developed with a specific aim and applications which are vulnerable by design. On one hand, the usual applications are those that are used ev... 详细信息
来源: 评论