Mitigating cross-site scripting attacks with a content security Policy
A content security policy (CSP) can help Web application developers and server administrators better control website content and avoid vulnerabilities to cross-site scripting (XSS). In experiments with a prototype website, the authors' CSP implementation successfully mitigated all XSS attack ty...
| Main Authors: | Yusof, Imran, Pathan, Al Sakib Khan |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
IEEE Computer Society
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/58853/ http://irep.iium.edu.my/58853/1/58853_Mitigating%20Cross-Site%20Scripting%20Attacks%20_article.pdf http://irep.iium.edu.my/58853/2/58853_Mitigating%20Cross-Site%20Scripting%20Attacks%20_scopus.pdf |
Similar Items
Rain fade mitigation on earth-to-satellite microwave links using site diversity
by: Islam, Md. Rafiqul, et al.
Published: (2016)
by: Islam, Md. Rafiqul, et al.
Published: (2016)
Analysis of rain fade mitigation using site diversity on earth-to-satellite microwave links at Ku-Band
by: Islam, Md. Rafiqul, et al.
Published: (2014)
by: Islam, Md. Rafiqul, et al.
Published: (2014)
Major works on the necessity and implementations of PKC in WSN: a beginner’s note
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Future Internet Addressing (FI Address)
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Internet and distributed computing knowledge in today’s world
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Femtocell interference mitigation
by: Zyoud, Al-Hareth, et al.
Published: (2012)
by: Zyoud, Al-Hareth, et al.
Published: (2012)
A case study: submarine cable in Bangladesh - its prospects, present status, and challenges ahead
by: Rahman, Mohammad Ziaur, et al.
Published: (2010)
by: Rahman, Mohammad Ziaur, et al.
Published: (2010)
A case study - establishing redundant access networks in the telecommunication sector of a developing country
by: Rahman, Mohammad Ziaur, et al.
Published: (2010)
by: Rahman, Mohammad Ziaur, et al.
Published: (2010)
Autonomic schemes for threat mitigation in internet of things
by: Ashraf, Qazi Mamoon, et al.
Published: (2015)
by: Ashraf, Qazi Mamoon, et al.
Published: (2015)
An efficient modulation technique to mitigate
nonlinearities in optical OFDM
by: Rahman, Muhammad Towfiqur, et al.
Published: (2014)
by: Rahman, Muhammad Towfiqur, et al.
Published: (2014)
Mitigation technique for rain fade using frequency diversity method
by: Kesavan, Ulaganathen, et al.
Published: (2016)
by: Kesavan, Ulaganathen, et al.
Published: (2016)
Frequency diversity improvement factor for rain fade mitigation in Malaysia
by: Islam, Md. Rafiqul, et al.
Published: (2015)
by: Islam, Md. Rafiqul, et al.
Published: (2015)
Impulsive noise mitigation in Haar DWT based OFDM systems
by: Ali, Moaaz Elhag, et al.
Published: (2013)
by: Ali, Moaaz Elhag, et al.
Published: (2013)
Data gathering with multi-attribute fusion in wireless sensor networks
by: Lin, Kai, et al.
Published: (2011)
by: Lin, Kai, et al.
Published: (2011)
Inter cell interference mitigation technique in femtocell and macrocell in LTE system
by: Reza, Asif, et al.
Published: (2017)
by: Reza, Asif, et al.
Published: (2017)
A web and software-based approach blending social networks for online Qur'anic Arabic learning
by: Abdullah, Matin Saad, et al.
Published: (2017)
by: Abdullah, Matin Saad, et al.
Published: (2017)
A test-bed analysis for seamless MIPv6 handover in heterogeneous environment
by: Uddin, Mohammad Moshee, et al.
Published: (2011)
by: Uddin, Mohammad Moshee, et al.
Published: (2011)
Comprehensive QoS analysis of MIPL based mobile IPv6 using single VS. dual interfaces
by: Uddin, Mohammad Moshee, et al.
Published: (2011)
by: Uddin, Mohammad Moshee, et al.
Published: (2011)
Dynamic frequency reuse: a method for interference mitigation
in OFDMA Based LTE-A Networks
by: Reza, Asif, et al.
Published: (2017)
by: Reza, Asif, et al.
Published: (2017)
NAMP: Neighbor Aware Multicast Routing Protocol for mobile ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Internet of things (IoT); security requirements, attacks and counter measures
by: Imdad, Maria, et al.
Published: (2020)
by: Imdad, Maria, et al.
Published: (2020)
Assessments of time diversity rain fade mitigation technique for v-band space-earth link operating in tropical climate
by: M Saad@Md Saad, Nurul Wahida, et al.
Published: (2013)
by: M Saad@Md Saad, Nurul Wahida, et al.
Published: (2013)
Survey on mobile and wireless security awareness: user perspectives
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Secure scheme for user authentication and authorization in android environment
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Performance analysis of a highly available home agent in mobile networks
by: Abdelgadir, Abdelgadir Tageldin, et al.
Published: (2011)
by: Abdelgadir, Abdelgadir Tageldin, et al.
Published: (2011)
Site diversity gain for earth-to-satellite links using rain intensity measurement
by: Islam, Md Rafiqul, et al.
Published: (2017)
by: Islam, Md Rafiqul, et al.
Published: (2017)
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
Security of self-organizing networks: MANET, WSN, WMN, VANET
Published: (2011)
Published: (2011)
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
A grouping scheme for secure multicasting in mobile IPv6
by: AI-Talib, Sahar, et al.
Published: (2003)
by: AI-Talib, Sahar, et al.
Published: (2003)
A survey on MANETs: architecture, evolution, applications,
security issues and solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013)
by: Khan, Burhan ul Islam, et al.
Published: (2013)
RFDA: Reliable framework for data administration based on split-merge policy
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
A primary interface selection policy in heterogeneous networks based on QoS
by: Masud, M. H., et al.
Published: (2012)
by: Masud, M. H., et al.
Published: (2012)
Prediction of cross polarization discrimination at millimeter wave band due to dust storms
by: Abdulwaheed, Musa, et al.
Published: (2013)
by: Abdulwaheed, Musa, et al.
Published: (2013)
Opportunistic contention-based feedback protocol for downlink OFDMA systems with mixed traffic
by: Patachaianand, Rachod, et al.
Published: (2009)
by: Patachaianand, Rachod, et al.
Published: (2009)
Bandwidth allocation policy using the game theory model in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Similar Items
-
Rain fade mitigation on earth-to-satellite microwave links using site diversity
by: Islam, Md. Rafiqul, et al.
Published: (2016) -
Analysis of rain fade mitigation using site diversity on earth-to-satellite microwave links at Ku-Band
by: Islam, Md. Rafiqul, et al.
Published: (2014) -
Major works on the necessity and implementations of PKC in WSN: a beginner’s note
by: Pathan, Al-Sakib Khan
Published: (2011) -
Future Internet Addressing (FI Address)
by: Pathan, Al-Sakib Khan
Published: (2008) -
Internet and distributed computing knowledge in today’s world
by: Pathan, Al-Sakib Khan
Published: (2011)