Machine and deep learning-based XSS detection approaches: a systematic literature review
Web applications are paramount tools for facilitating services providing in the modern world. Unfortunately, the tremendous growth in the web application usage has resulted in a rise in cyberattacks. Cross-site scripting (XSS) is one of the most frequent cyber security attack vectors that threaten t...
| Main Authors: | Thajeel, Isam Kareem, Samsudin, Khairulmizam, Hashim, Shaiful Jahari, Hashim, Fazirulhisyam |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2023
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/109487/ http://psasir.upm.edu.my/id/eprint/109487/1/1-s2.0-S1319157823001829-main.pdf |
Similar Items
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
by: Kareem Thajeel, Isam, et al.
Published: (2023)
by: Kareem Thajeel, Isam, et al.
Published: (2023)
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Deep learning approach in DOA estimation: a systematic literature review
by: Ge, Shengguo, et al.
Published: (2021)
by: Ge, Shengguo, et al.
Published: (2021)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
A systematic review of machine learning and deep learning techniques for anomaly detection in data mining
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Machine learning and deep learning approaches for detecting DDoS attacks in cloud environments
by: Khan, Muhammad Asif, et al.
Published: (2025)
by: Khan, Muhammad Asif, et al.
Published: (2025)
IoT intrusion detection using auto-encoder and machine learning techniques
by: Khudhu, Ahmed Ridha, et al.
Published: (2022)
by: Khudhu, Ahmed Ridha, et al.
Published: (2022)
A systematic literature review on the use of deep learning in precision livestock detection and localization using unmanned aerial vehicles
by: Mamehgol Yousefi, D. B., et al.
Published: (2022)
by: Mamehgol Yousefi, D. B., et al.
Published: (2022)
A systematic review of deep learning microalgae classification and detection
by: Madkour, Dina M., et al.
Published: (2023)
by: Madkour, Dina M., et al.
Published: (2023)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
The effect of SPOC hybrid model on deep learning effectiveness : A systematic literature review
by: Pan, Bo, et al.
Published: (2023)
by: Pan, Bo, et al.
Published: (2023)
Performance evaluation of activation functions in deep residual networks for short-term load forecasting
by: Liu, Junchen, et al.
Published: (2025)
by: Liu, Junchen, et al.
Published: (2025)
Small Face Detection with Deep Learning
Approaches
by: Tuli, Sabrina Hoque
Published: (2021)
by: Tuli, Sabrina Hoque
Published: (2021)
Crosstalk-aware multiple error detection scheme based on two-dimensional parities for energy efficient network on chip
by: Flayyih, Wameedh N., et al.
Published: (2014)
by: Flayyih, Wameedh N., et al.
Published: (2014)
Cancer detection using image processing and machine/deep learning methods
by: Leong, Zeh Zen
Published: (2022)
by: Leong, Zeh Zen
Published: (2022)
SCARECROW: scalable malware reporting, detection and analysis
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
by: Barakat, Osamah Lutf Hamood, et al.
Published: (2013)
Learning mathematics using an ethnomathematics approach: a systematic literature review
by: Hendriyanto, Agus, et al.
Published: (2023)
by: Hendriyanto, Agus, et al.
Published: (2023)
A systematic literature review in distributed resource allocation for C-V2X
by: Al-Najjar, Ali Nihad, et al.
Published: (2024)
by: Al-Najjar, Ali Nihad, et al.
Published: (2024)
A Deep Learning Approach to Detect SNP Interactions
by: Uppu, S., et al.
Published: (2016)
by: Uppu, S., et al.
Published: (2016)
Investigate And Analysis Of Deep Learning And Machine Learning Algorithm For Face Mask Detection System
by: Muhammad Ezzuddeen, Suratman
Published: (2022)
by: Muhammad Ezzuddeen, Suratman
Published: (2022)
Insight on face liveness detection: a systematic literature review
by: Alkinany, Enas Akeel Raheem, et al.
Published: (2019)
by: Alkinany, Enas Akeel Raheem, et al.
Published: (2019)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Optimization of power utilization in multi-mobile robot foraging behavior inspired by honeybees system
by: Ahmad, Faisul Arif, et al.
Published: (2014)
by: Ahmad, Faisul Arif, et al.
Published: (2014)
Energy management in mobile robotics system based on biologically inspired honeybees behavior
by: Ahmad, Faisul Arif, et al.
Published: (2011)
by: Ahmad, Faisul Arif, et al.
Published: (2011)
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
Rootkit Guard (RG) - an architecture for rootkit resistant file-system implementation based on TPM
by: Yew, Teh Jia, et al.
Published: (2013)
by: Yew, Teh Jia, et al.
Published: (2013)
GPU accelerated stereo vision system to capture handwriting information
by: Fadi Imad, et al.
Published: (2019)
by: Fadi Imad, et al.
Published: (2019)
Short-term load forecasting utilizing a combination model: a brief review
by: Ahmad, Faisul Arif, et al.
Published: (2024)
by: Ahmad, Faisul Arif, et al.
Published: (2024)
Cyberbullying using the phenomenological approach: a systematic literature review
by: Lian, Tang, et al.
Published: (2023)
by: Lian, Tang, et al.
Published: (2023)
Approaches in creating meta-requirement: a systematic literature review
by: Muhamad Idaham, Umar Ong, et al.
Published: (2019)
by: Muhamad Idaham, Umar Ong, et al.
Published: (2019)
Feature-Based Object Detection and Tracking: A Systematic Literature Review
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2023)
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2023)
Generative adversarial networks in object detection: A systematic literature review
by: Anis Farihan, Mat Raffei, et al.
Published: (2025)
by: Anis Farihan, Mat Raffei, et al.
Published: (2025)
A systematic literature review on outlier detection in wireless sensor networks
by: Safaei, Mahmood, et al.
Published: (2020)
by: Safaei, Mahmood, et al.
Published: (2020)
Trends on technologies and artificial intelligence in education for personalized learning: systematic literature review
by: Hashim, Suraya, et al.
Published: (2022)
by: Hashim, Suraya, et al.
Published: (2022)
Cyberbullying detection: a machine learning approach
by: Yeong, Su Yen
Published: (2022)
by: Yeong, Su Yen
Published: (2022)
Systematic review of intrusion detection system based on machine learning techniques for internet of things
by: Idris, Muhammad, et al.
Published: (2023)
by: Idris, Muhammad, et al.
Published: (2023)
Analytical modelling approach for switched reluctance machines with deep saturation
by: Ding, Xiaofeng, et al.
Published: (2016)
by: Ding, Xiaofeng, et al.
Published: (2016)
Vehicle Detection in Deep Learning
by: Teoh, Per Nian
Published: (2019)
by: Teoh, Per Nian
Published: (2019)
Deep learning-based recommendation system: systematic review and classification
by: Li, Caiwen, et al.
Published: (2023)
by: Li, Caiwen, et al.
Published: (2023)
Similar Items
-
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
by: Kareem Thajeel, Isam, et al.
Published: (2023) -
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015) -
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024) -
Deep learning approach in DOA estimation: a systematic literature review
by: Ge, Shengguo, et al.
Published: (2021) -
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)