An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the Hyper Text Markup Language (HTML)...
| Main Author: | Hydara, Isatou |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/57098/ http://psasir.upm.edu.my/id/eprint/57098/1/FSKTM%202015%205RR%20UPM%20IR.pdf |
Similar Items
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
PiWall as a home traffic controller: enabling parental control and monitoring
by: Abd Razak, Nurul Imanina, et al.
Published: (2024)
by: Abd Razak, Nurul Imanina, et al.
Published: (2024)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Security assessment of FTMSK web server / Md Nazri Hashim
by: Hashim, Md Nazri
Published: (2005)
by: Hashim, Md Nazri
Published: (2005)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Web Agent Event Finder (WAEF) / Masita Mohamed Shah
by: Mohamed Shah, Masita
Published: (2006)
by: Mohamed Shah, Masita
Published: (2006)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021)
by: Hydara, Isatou, et al.
Published: (2021)
Ciri muka hadapan laman web e-komuniti di malaysia
by: Mat Salleh, Suzila
Published: (2008)
by: Mat Salleh, Suzila
Published: (2008)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Evaluating local first page university site using 'U' tool
by: Abd Aziz, Zalilah
Published: (2003)
by: Abd Aziz, Zalilah
Published: (2003)
A Prototype of Web-Based Simulation Environment (WEBSIM)
by: Tan, Kee Leong
Published: (2000)
by: Tan, Kee Leong
Published: (2000)
Development of web based tutorial system using fuzzy expert / Suzierawati Said
by: Said, Suzierawati
Published: (2006)
by: Said, Suzierawati
Published: (2006)
E-Tazkirah Video Streaming Web Portal: a prototype / Sabrina Ahamat
by: Ahamat, Sabrina
Published: (2006)
by: Ahamat, Sabrina
Published: (2006)
Garis panduan reka bentuk untuk meningkatkan kebolehgunaan tapak web
by: Abdullah, Muhammad Ihsan Lim
Published: (2001)
by: Abdullah, Muhammad Ihsan Lim
Published: (2001)
Worst-input mutation approach to web services vulnerability testing based on SOAP messages
by: Chen, Jinfu, et al.
Published: (2014)
by: Chen, Jinfu, et al.
Published: (2014)
Web-based medicine inventory using decision support system (DDS) approach / Junaini Harshah
by: Harshah, Junaini
Published: (2005)
by: Harshah, Junaini
Published: (2005)
A prototype of mobile info system portal web-based system / Rashidah Abd Aziz
by: Abd Aziz, Rashidah
Published: (2005)
by: Abd Aziz, Rashidah
Published: (2005)
Toward spam 2.0: an evaluation of web 2.0 anti-spam methods
by: Hayati, Pedram, et al.
Published: (2009)
by: Hayati, Pedram, et al.
Published: (2009)
The development and implementation of web content adaptation and negotiation based on user, device and network profiles / Harizah Sazali
by: Sazali, Harizah
Published: (2006)
by: Sazali, Harizah
Published: (2006)
New compendium of RSA vulnerabilities
by: Abd Ghafar, Amir Hamzah
Published: (2020)
by: Abd Ghafar, Amir Hamzah
Published: (2020)
Towards developing a web application with text filtering for FTMSK : A case study for electronic exchange board / Sumardi Shukor
by: Shukor, Sumardi
Published: (2006)
by: Shukor, Sumardi
Published: (2006)
A study of myFTMSK web portal visitor behavior using visitor tacking system / Mohd Rosli Ab Sukor
by: Ab Sukor, Mohd Rosli
Published: (2005)
by: Ab Sukor, Mohd Rosli
Published: (2005)
Maintainability Evaluation for Web Applications
by: Zaini, Zaida
Published: (2006)
by: Zaini, Zaida
Published: (2006)
Semantic Web Service Matchmakers: State Of The Art And Challenges
by: Dong, Hai, et al.
Published: (2013)
by: Dong, Hai, et al.
Published: (2013)
Internet of things (IoT) device for web based monitoring of gas leakage / Mohd Aliff Mahdzir
by: Mahdzir, Mohd Aliff
Published: (2020)
by: Mahdzir, Mohd Aliff
Published: (2020)
D’Bridal Boutique website and online customer reservation system / Aziatul Azna Mohd Isa
by: Mohd Isa, Aziatul Azna
Published: (2012)
by: Mohd Isa, Aziatul Azna
Published: (2012)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Similar Items
-
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024) -
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022) -
PiWall as a home traffic controller: enabling parental control and monitoring
by: Abd Razak, Nurul Imanina, et al.
Published: (2024) -
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015) -
Security assessment of FTMSK web server / Md Nazri Hashim
by: Hashim, Md Nazri
Published: (2005)