Cross-site scripting detection based on an enhanced genetic algorithm
Software security vulnerabilities have led to many successful attacks on applications, especially web applications, on a daily basis. These attacks, including cross-site scripting, have caused damages for both web site owners and users. Cross-site scripting vulnerabilities are easy to exploit but di...
| Main Authors: | Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Science and Knowledge Research Society
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/67005/ http://psasir.upm.edu.my/id/eprint/67005/1/ICCSCM-6.pdf |
Similar Items
An approach for cross-site scripting detection and removal based on genetic algorithms.
by: Hydara, Isatou, et al.
Published: (2014)
by: Hydara, Isatou, et al.
Published: (2014)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021)
by: Hydara, Isatou, et al.
Published: (2021)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Enhanced pushdown automaton based static analysis for detection of SQL injection Hotspots in web application
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Mitigating cross-site scripting attacks with a content security Policy
by: Yusof, Imran, et al.
Published: (2016)
by: Yusof, Imran, et al.
Published: (2016)
Automatic generation of content security policy to mitigate cross site scripting
by: Mhana, Samer Attallah, et al.
Published: (2016)
by: Mhana, Samer Attallah, et al.
Published: (2016)
Genetic algorithm application for enhancing state-sensitivity partitioning
by: Mohammed Sultan, Ammar, et al.
Published: (2015)
by: Mohammed Sultan, Ammar, et al.
Published: (2015)
Adopting genetic algorithm to enhance state-sensitivity partitioning
by: Sultan, Ammar Mohammed, et al.
Published: (2015)
by: Sultan, Ammar Mohammed, et al.
Published: (2015)
Defining fitness function for search based assessment of grammar reachability
by: Umar, Kabir, et al.
Published: (2018)
by: Umar, Kabir, et al.
Published: (2018)
Gap analysis in specifying porting requirements for mobile application
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
by: Rajadorai, Kesava Pillai, et al.
Published: (2016)
Preventing persistent cross-site scripting (XSS) attack by applying pattern filtering approach
by: Yusof, Imran, et al.
Published: (2014)
by: Yusof, Imran, et al.
Published: (2014)
A Code generator tool for the gamma design patterns / Novia Indriaty Admodisastro
by: Novia Indriaty, Admodisastro
Published: (2003)
by: Novia Indriaty, Admodisastro
Published: (2003)
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model
by: Kareem Thajeel, Isam, et al.
Published: (2023)
by: Kareem Thajeel, Isam, et al.
Published: (2023)
Prevention of attack on Islamic websites by fixing SQL injection vulnerabilities using co-evolutionary search approach
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
SQL Injection attack roadmap and fusion
by: Umar, Kabir, et al.
Published: (2016)
by: Umar, Kabir, et al.
Published: (2016)
An architecture analysis approach for supporting black-box software development.
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
iXML : a process-pluggable ADL for supporting architectural analysis in component-based systems.
by: Admodisastro, Novia Indriaty, et al.
by: Admodisastro, Novia Indriaty, et al.
Usability requirements for architectural analysis tool to support CBD
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
by: Admodisastro, Novia Indriaty, et al.
Published: (2011)
iXML: a process-pluggable ADL for supporting architectural analysis in component-based systems
by: Admodisastro, Novia Indriaty, et al.
Published: (2012)
by: Admodisastro, Novia Indriaty, et al.
Published: (2012)
A code generator tool for the gamma design patterns
by: Admodisastro, Novia Indriaty, et al.
Published: (2002)
by: Admodisastro, Novia Indriaty, et al.
Published: (2002)
Home (Script)
by: Brown Ash, M., et al.
Published: (2015)
by: Brown Ash, M., et al.
Published: (2015)
A dynamic reconfiguration model of web services in service-oriented architecture
by: Ilahi, Rahmat, et al.
Published: (2017)
by: Ilahi, Rahmat, et al.
Published: (2017)
Inconsistency detection of model and code via critic-based approach
by: Mohammed, Osman, et al.
Published: (2017)
by: Mohammed, Osman, et al.
Published: (2017)
Class diagram critic: a design critic tool for UML class diagram
by: Abdulkareem, Soran Mahmood, et al.
Published: (2017)
by: Abdulkareem, Soran Mahmood, et al.
Published: (2017)
Hybrid genetic algorithm for improving fault localization
by: Mahamad Zakaria, Muhammad Luqman, et al.
Published: (2018)
by: Mahamad Zakaria, Muhammad Luqman, et al.
Published: (2018)
Enhancing software effort estimation in the analogy-based approach through the combination of regression methods
by: Javdani Gandomani, Taghi, et al.
Published: (2024)
by: Javdani Gandomani, Taghi, et al.
Published: (2024)
An approach for vulnerability detection in web applications using graph neural networks and transformers
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
A systematic mapping of quality models for AI systems, software and components
by: Ali, Mohamed Abdullahi, et al.
Published: (2022)
by: Ali, Mohamed Abdullahi, et al.
Published: (2022)
An Arabic Script Recognition System
by: Alginahi, Yasser M., et al.
Published: (2015)
by: Alginahi, Yasser M., et al.
Published: (2015)
Crossover and mutation operators of genetic algorithms
by: Lim, Siew Mooi, et al.
Published: (2017)
by: Lim, Siew Mooi, et al.
Published: (2017)
Similar Items
-
An approach for cross-site scripting detection and removal based on genetic algorithms.
by: Hydara, Isatou, et al.
Published: (2014) -
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018) -
The limitations of cross-site scripting vulnerabilities detection and removal techniques
by: Hydara, Isatou, et al.
Published: (2021) -
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022) -
Current state of research on cross-site scripting (XSS) – a systematic literature review
by: Hydara, Isatou, et al.
Published: (2015)