Current state of research on cross-site scripting (XSS) – a systematic literature review
Context: Cross-site scripting (XSS) is a security vulnerability that affects web applications. It occurs due to improper or lack of sanitization of user inputs. The security vulnerability caused many problems for users and server applications. Objective: To conduct a systematic literature review on...
| Main Authors: | Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro , Novia Indriaty |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/36950/ http://psasir.upm.edu.my/id/eprint/36950/1/Current%20state%20of%20research%20on%20cross.pdf |
Similar Items
Cross-site scripting detection based on an enhanced genetic algorithm
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021)
by: Hydara, Isatou, et al.
Published: (2021)
An approach for cross-site scripting detection and removal based on genetic algorithms.
by: Hydara, Isatou, et al.
Published: (2014)
by: Hydara, Isatou, et al.
Published: (2014)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Machine and deep learning-based XSS detection approaches: a systematic literature review
by: Thajeel, Isam Kareem, et al.
Published: (2023)
by: Thajeel, Isam Kareem, et al.
Published: (2023)
Mitigating cross-site scripting attacks with a content security Policy
by: Yusof, Imran, et al.
Published: (2016)
by: Yusof, Imran, et al.
Published: (2016)
Automatic generation of content security policy to mitigate cross site scripting
by: Mhana, Samer Attallah, et al.
Published: (2016)
by: Mhana, Samer Attallah, et al.
Published: (2016)
Gap analysis in specifying porting requirements for mobile application
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
Systematic literature review : the important factors in assessing the trustworthiness of OSS.
by: Md. Sultan, Abu Bakar, et al.
Published: (2013)
by: Md. Sultan, Abu Bakar, et al.
Published: (2013)
A systematic mapping of quality models for AI systems, software and components
by: Ali, Mohamed Abdullahi, et al.
Published: (2022)
by: Ali, Mohamed Abdullahi, et al.
Published: (2022)
A Code generator tool for the gamma design patterns / Novia Indriaty Admodisastro
by: Novia Indriaty, Admodisastro
Published: (2003)
by: Novia Indriaty, Admodisastro
Published: (2003)
Preliminary systematic literature review on the adoption of Security as a Service (SECaaS)
by: Tanko, Mohammed Yahaya, et al.
Published: (2023)
by: Tanko, Mohammed Yahaya, et al.
Published: (2023)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Defining fitness function for search based assessment of grammar reachability
by: Umar, Kabir, et al.
Published: (2018)
by: Umar, Kabir, et al.
Published: (2018)
A systematic literature review on characteristics influencing
software reliability
by: Hassan, Sa'adah, et al.
Published: (2024)
by: Hassan, Sa'adah, et al.
Published: (2024)
Outdoor mobility assistive technologies for people with vision impairment or blindness – a state of the art
by: A., Malkawi, et al.
Published: (2019)
by: A., Malkawi, et al.
Published: (2019)
An architecture analysis approach for supporting black-box software development.
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
iXML : a process-pluggable ADL for supporting architectural analysis in component-based systems.
by: Admodisastro, Novia Indriaty, et al.
by: Admodisastro, Novia Indriaty, et al.
Usability requirements for architectural analysis tool to support CBD
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
iXML: a process-pluggable ADL for supporting architectural analysis in component-based systems
by: Admodisastro, Novia Indriaty, et al.
Published: (2012)
by: Admodisastro, Novia Indriaty, et al.
Published: (2012)
A code generator tool for the gamma design patterns
by: Admodisastro, Novia Indriaty, et al.
Published: (2002)
by: Admodisastro, Novia Indriaty, et al.
Published: (2002)
Penetration testing using Kali Linux: SQL injection, XSS, Wordpress, and WPA2 attacks
by: Gunawan, Teddy Surya, et al.
Published: (2018)
by: Gunawan, Teddy Surya, et al.
Published: (2018)
Home (Script)
by: Brown Ash, M., et al.
Published: (2015)
by: Brown Ash, M., et al.
Published: (2015)
Requirements prioritization techniques focusing on agile software development: a systematic literature review
by: Borhan, Noor Hazlini, et al.
Published: (2019)
by: Borhan, Noor Hazlini, et al.
Published: (2019)
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
by: Kareem Thajeel, Isam, et al.
Published: (2023)
by: Kareem Thajeel, Isam, et al.
Published: (2023)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
An Arabic Script Recognition System
by: Alginahi, Yasser M., et al.
Published: (2015)
by: Alginahi, Yasser M., et al.
Published: (2015)
On the current agile assessment methods and approaches
by: Nafchi, Mina Ziaei, et al.
Published: (2014)
by: Nafchi, Mina Ziaei, et al.
Published: (2014)
New journalism in documentary script writing
by: Indra, Syirfan, et al.
Published: (2023)
by: Indra, Syirfan, et al.
Published: (2023)
Similar Items
-
Cross-site scripting detection based on an enhanced genetic algorithm
by: Hydara, Isatou, et al.
Published: (2015) -
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018) -
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022) -
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021) -
An approach for cross-site scripting detection and removal based on genetic algorithms.
by: Hydara, Isatou, et al.
Published: (2014)