Towards Vulnerability Prevention Model for Web Browser using Interceptor Approach
Cross Site Scripting (XSS) is popular security vulnerability in modern web applications. XSS attacks are malicious scripts which are embedded by attackers into the source code of web page to be executed at client side by browsers. Researchers have proposed many techniques for detection and preventio...
| Main Authors: | Nayeem, Khan, Johari, Abdullah, Adnan, Shahid Khan |
|---|---|
| Format: | Proceeding |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://ir.unimas.my/id/eprint/13031/ http://ir.unimas.my/id/eprint/13031/1/Towards%20Vulnerability%20Prevention%20Model%20for%20Web%20Browser%20%28abstract%29.pdf |
Similar Items
Vulnerability Prevention Model for Web Browser using Interceptor Approach
by: Ahmad Khan, Nayeem, et al.
Published: (2015)
by: Ahmad Khan, Nayeem, et al.
Published: (2015)
WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10
by: Rayman, Dafiqah Mior, et al.
Published: (2022)
by: Rayman, Dafiqah Mior, et al.
Published: (2022)
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017)
by: Z, Nuha, et al.
Published: (2017)
Automatically identifying coherent web sessions from browser logs
by: Ye, Chaoyu
Published: (2019)
by: Ye, Chaoyu
Published: (2019)
The affects of caching in browser stage on the performance of web items delivery
by: Yasin, Waheed, et al.
Published: (2013)
by: Yasin, Waheed, et al.
Published: (2013)
Interceptor drainage modelling to manage high groundwater table on the Abyek Plain, Iran
by: Ghorbani, Karim, et al.
Published: (2016)
by: Ghorbani, Karim, et al.
Published: (2016)
Towards a video browser for the digital native
by: Adams, Brett, et al.
Published: (2012)
by: Adams, Brett, et al.
Published: (2012)
User Perception on Intelligent Split Menu for Web Browser Data Entry
by: Mahamad, Saipunidzam, et al.
Published: (2010)
by: Mahamad, Saipunidzam, et al.
Published: (2010)
Defending Malicious Script Attacks Using Machine
Learning Classifiers
by: Nayeem, Khan, et al.
Published: (2017)
by: Nayeem, Khan, et al.
Published: (2017)
Modelling of interceptor drainage effect on water table and salinity levels in agricultural area of Abyek Plain Iran
by: Ghorbani, Karim
Published: (2016)
by: Ghorbani, Karim
Published: (2016)
A graphical browser for hypermedia systems
by: Yong, Huan Loon
Published: (1995)
by: Yong, Huan Loon
Published: (1995)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Effective way to defend the hypervisor attacks in cloud computing
by: Muhammad Shahid, Dildar, et al.
Published: (2017)
by: Muhammad Shahid, Dildar, et al.
Published: (2017)
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
by: Asmawi, Aziah, et al.
Published: (2024)
by: Asmawi, Aziah, et al.
Published: (2024)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
An approach for vulnerability detection in web applications using graph neural networks and transformers
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Evaluation of risk associated with treatment of fat, oil, and grease: Grease interceptor from food processing industry effluent using bowtie analysis
by: Nurul Atikah, Azmi, et al.
Published: (2024)
by: Nurul Atikah, Azmi, et al.
Published: (2024)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Cross-browser compatibility : Problem and solution / Junaidah Ab Aziz
by: Ab Aziz, Junaidah
Published: (2004)
by: Ab Aziz, Junaidah
Published: (2004)
XML for browser-based electronic medical records / Maizirah Ibrahim
by: Maizirah, Ibrahim
Published: (2005)
by: Maizirah, Ibrahim
Published: (2005)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
I-Browser: A real-time digital content display using VR technology
by: Rafi , A., et al.
Published: (2004)
by: Rafi , A., et al.
Published: (2004)
Effects of new-to-market E-store features on first time browsers
by: McKechnie, Sally, et al.
Published: (2016)
by: McKechnie, Sally, et al.
Published: (2016)
Internet browser bookmark synchronization tool / Muhd Baharul Nashim Ibrahim
by: Ibrahim, Muhd Baharul Nashim
Published: (2007)
by: Ibrahim, Muhd Baharul Nashim
Published: (2007)
XML for browser-based electronic medical records / Hafizam Mat Hussin
by: Hafizam, Mat Hussin
Published: (2005)
by: Hafizam, Mat Hussin
Published: (2005)
Worst-input mutation approach to web services vulnerability testing based on SOAP messages
by: Chen, Jinfu, et al.
Published: (2014)
by: Chen, Jinfu, et al.
Published: (2014)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Vulnerability assessment in Malaysia government web-based application
by: Lau, Lee Keng
Published: (2020)
by: Lau, Lee Keng
Published: (2020)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Hadith's source of reference finder browser extension / Mohamad Hafiz Khairuddin … [et al.]
by: Khairuddin, Mohamad Hafiz, et al.
Published: (2017)
by: Khairuddin, Mohamad Hafiz, et al.
Published: (2017)
An empirical comparison of commercial and open‐source web vulnerability scanners
by: Amankwah, Richard, et al.
Published: (2020)
by: Amankwah, Richard, et al.
Published: (2020)
Quantitative assessment on remote code execution vulnerability in web apps
by: Md. Maruf, Hassan, et al.
Published: (2019)
by: Md. Maruf, Hassan, et al.
Published: (2019)
Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Similar Items
-
Vulnerability Prevention Model for Web Browser using Interceptor Approach
by: Ahmad Khan, Nayeem, et al.
Published: (2015) -
WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10
by: Rayman, Dafiqah Mior, et al.
Published: (2022) -
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017) -
Automatically identifying coherent web sessions from browser logs
by: Ye, Chaoyu
Published: (2019) -
The affects of caching in browser stage on the performance of web items delivery
by: Yasin, Waheed, et al.
Published: (2013)