[1]
|
Kirsten, S. (2016) Cross Site Scripting (XSS) Software Attack.
https://owasp.org/www-community/attacks/xss/
|
[2]
|
Agrawal, D.P. and Wang, H. (2018) Computer and Cyber Security. Auerbach Publications, New York. https://doi.org/10.1201/9780429424878
|
[3]
|
Jiang, F., Fu, Y., Gupta, B.B., Liang, Y., Rho, S., Lou, F., et al. (2020) Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security. IEEE Transactions on Sustainable Computing, 5, 204-212.
https://doi.org/10.1109/TSUSC.2018.2793284
|
[4]
|
Baş Seyyar, M., Çatak, F.Ö. and Gül, E. (2018) Detection of Attack-Targeted Scans from the Apache HTTP Server Access Logs. Applied Computing and Informatics, 14, 28-36.
https://doi.org/10.1016/j.aci.2017.04.002
|
[5]
|
Chen, H.-C., Nshimiyimana, A., Damarjati, C. and Chang, P.-H. (2021) Detection and Prevention of Cross-Site Scripting Attack with Combined Approaches. 2021 International Conference on Electronics, Information, and Communication (ICEIC), Jeju, 31 January-3 February 2021, 1-4. https://doi.org/10.1109/ICEIC51217.2021.9369796
|
[6]
|
Gan, J.-M., Ling, H.-Y. and Leau, Y.-B. (2021) A Review on Detection of Cross-Site Scripting Attacks (XSS) in Web Security. International Conference on Advances in Cyber Security, Penang, 8-9 December 2020, 685-709.
https://link.springer.com/chapter/10.1007/978-981-33-6835-4_45
|
[7]
|
Wibowo, R.M. and Sulaksono, A. (2021) Web Vulnerability Through Cross Site Scripting (XSS) Detection with OWASP Security Shepherd. Indonesian Journal of Information Systems, 3, 149-59. https://doi.org/10.24002/ijis.v3i2.4192
|
[8]
|
Dora, J.R. and Nemoga, K. (2021) Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity. Journal of Cybersecurity and Privacy, 2021, 319-339.
https://doi.org/10.3390/jcp1020018
|
[9]
|
Nirmal, K., Janet, B. and Kumar, R. (2018) Web Application Vulnerabilities—The Hacker’s Treasure. 2018 International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, 11-12 July 2018, 58-62.
https://doi.org/10.1109/ICIRCA.2018.8597221
|
[10]
|
Cui, Y., Cui, J. and Hu, J. (2020) A Survey on XSS Attack Detection and Prevention in Web Applications. Proceedings of the 2020 12th International Conference on Machine Learning and Computing, Shenzhen, 15-17 February 2020, 443-449.
https://doi.org/10.1145/3383972.3384027
|
[11]
|
Khazal, I. and Hussain, M. (2021) Server Side Method to Detect and Prevent Stored XSS Attack. Iraqi Journal for Electrical and Electronic Engineering, 17, 58-65.
https://doi.org/10.37917/ijeee.17.2.8
|
[12]
|
Revyakina, Y., Cherckesova, L., Safaryan, O., Korochentsev, D., Boldyrikhin, N. and Ivanov, Y. (2020) Possibilities of Conducting XSS-Attacks and the Development of Countermeasures. E3S Web of Conferences, 224, Article No. 01040.
https://doi.org/10.1051/e3sconf/202022401040
|
[13]
|
Maurel, H., Vidal, S. and Rezk, T. (2022) Statically Identifying XSS Using Deep Learning. Science of Computer Programming, 219, Article ID: 102810.
https://doi.org/10.1016/j.scico.2022.102810
|
[14]
|
Hickling, J. (2021) What Is DOM XSS and Why Should You Care? Computer Fraud & Security, 2021, 6-10. https://doi.org/10.1016/S1361-3723(21)00040-3
|
[15]
|
Ninawe, S. and Wajgi, R. (2020) Detection of DOM-Based XSS Attack on Web Application. Intelligent Communication Technologies and Virtual Mobile Networks 2019, Tirunelveli, 14-15 February 2019, 633-641.
https://link.springer.com/chapter/10.1007/978-3-030-28364-3_65
|
[16]
|
Wang, P., Bangert, J. and Kern, C. (2021) If It’s Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development with API Hardening. 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), Madrid, 22-30 May 2021, 1360-1372.
https://doi.org/10.1109/ICSE43902.2021.00123
|
[17]
|
Hoffman, A. (2020) Web Application Security: Exploitation and Countermeasures for Modern Web Applications. O’Reilly Media, Inc., Sebastopol.
https://books.google.com/books?hl=en&lr=&id=3R3UDwAAQBAJ&oi=fnd&pg=PR2&dq=Web+application+security%E2%80%AF:+exploitation+and+countermeasures+for+modern+web+applications&ots=PGdlEp9ORy&sig=0EKCDxN_UPA9rpVKQvwPPjvzmyk#v=onepage&q=Web%20application%20security%E2%80%AF%3A%20exploitation%20and%20countermeasures%20for%20modern%20web%20applications&f=false
|
[18]
|
Remya, S. and Praveen, K. (2016) Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting. Proceedings of the 2nd International Conference on Computer and Communication Technologies, Vol. 1, Hyderabad, 24-26 July 2015, 215-223.
https://link.springer.com/chapter/10.1007/978-81-322-2517-1_22
|
[19]
|
Kaur, J. and Garg, U. (2021) A Detailed Survey on Recent XSS Web-Attacks Machine Learning Detection Techniques. 2021 2nd Global Conference for Advancement in Technology (GCAT 2021), Bangalore, 1-3 October 2021, 1-6.
https://doi.org/10.1109/GCAT52182.2021.9587569
|
[20]
|
Pazos, J.C., Légaré, J.S. and Beschastnikh, I. (2021) XSnare: Application-Specific Client-Side Cross-Site Scripting Protection. Proceedings of 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2021), Honolulu, 9-12 March 2021, 154-165.
https://doi.org/10.1109/SANER50967.2021.00023
|
[21]
|
Mohammadi, M., Chu, B. and Richter Lipford, H. (2019) Automated Repair of Cross-Site Scripting Vulnerabilities through Unit Testing. Proceedings of 2019 IEEE 30th International Symposium on Software Reliability Engineering Workshops, (ISSREW 2019), Berlin, 27-30 October 2019, 370-377.
https://doi.org/10.1109/ISSREW.2019.00098
|
[22]
|
Wang, Y., Zhou, Y., Zou, X., Miao, Q. and Wang, W. (2020) The Analysis Method of Security Vulnerability Based on the Knowledge Graph. 2020 10th International Conference on Communication and Network Security, Tokyo, 27-29 November 2020, 135-145. https://doi.org/10.1145/3442520.3442535
|
[23]
|
Williams, M.A., Dey, S., Barranco, R.C., Naim, S.M., Hossain, M.S. and Akbar, M. (2018) Analyzing Evolving Trends of Vulnerabilities in National Vulnerability Database. 2018 IEEE International Conference on Big Data (Big Data), Seattle, 10-13 December 2018, 3011-3020. https://doi.org/10.1109/BigData.2018.8622299
|
[24]
|
Forain, I., de Oliveira Albuquerque, R. and de Sousa Júnior, R.T. (2022) Towards System Security: What a Comparison of National Vulnerability Databases Reveals. 2022 17th Iberian Conference on Information Systems and Technologies (CISTI), Madrid, 22-25 June 2022, 1-6. https://doi.org/10.23919/CISTI54924.2022.9820232
|
[25]
|
Guo, H., Xing, Z., Chen, S., Li, X., Bai, Y. and Zhang, H. (2021) Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases. 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), Madrid, 12-16 July 2021, 1020-1025.
https://doi.org/10.1109/COMPSAC51774.2021.00138
|
[26]
|
Wang, T., Qin, S. and Chow, K.P. (2021) Towards Vulnerability Types Classification Using Pure Self-Attention: A Common Weakness Enumeration Based Approach. 2021 IEEE 24th International Conference on Computational Science and Engineering (CSE), Shenyang, 20-22 October 2021, 146-153.
https://doi.org/10.1109/CSE53436.2021.00030
|
[27]
|
Mantha, B.R.K., Jung, Y. and Garcia De Soto, B. (2020) Implementation of the Common Vulnerability Scoring System to Assess the Cyber Vulnerability in Construction Projects. Creative Construction E-Conference 2020, Online, 28 June-1 July 2020, 117-124.
|
[28]
|
Fangohr, H., Kluyver, T. and DiPierro, M. (2021) Jupyter in Computational Science. Computing in Science & Engineering, 23, 5-6.
https://doi.org/10.1109/MCSE.2021.3059494
|
[29]
|
Pradeepa, P.K. (2022) A Survey on an Investigation of Detection & Prevention Methods for Cross-Site Scripting (XSS) Attacks. International Journal of Advanced Research in Science, Communication and Technology, 405-413.
|
[30]
|
Kaur, J. and Garg, U. (2021) A Detailed Survey on Recent XSS Web-Attacks Machine Learning Detection Techniques. 2021 2nd Global Conference for Advancement in Technology (GCAT 2021), Bangalore, 1-3 October 2021, 1-6.
https://doi.org/10.1109/GCAT52182.2021.9587569
|
[31]
|
Sahoo, S.R. and Gupta, B.B. (2019) Classification of Various Attacks and Their Defence Mechanism in Online Social Networks: A Survey. Enterprise Information Systems, 13, 832-864. https://doi.org/10.1080/17517575.2019.1605542
|
[32]
|
Kaur, G., Pande, B., Bhardwaj, A., Bhagat, G. and Gupta, S. (2018) Efficient Yet Robust Elimination of XSS Attack Vectors from HTML5 Web Applications Hosted on OSN-Based Cloud Platforms. Procedia Computer Science, 125, 669-675.
https://doi.org/10.1016/j.procs.2017.12.086
|
[33]
|
Xu, G., Xie, X., Huang, S., Zhang, J., Pan, L., Lou, W., et al. (2020) JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers. IEEE Transactions on Dependable and Secure Computing, 19, 826-878.
https://doi.org/10.1109/TDSC.2020.3009472
|
[34]
|
Lala, S.K., Kumar, A. and Subbulakshmi, T. (2021) Secure Web Development Using OWASP Guidelines. Proceedings of 5th International Conference on Intelligent Computing and Control Systems (ICICCS 2021), Madurai, 6-8 May 2021, 323-332.
https://doi.org/10.1109/ICICCS51141.2021.9432179
|
[35]
|
Sahin, M., Ünlü, T., Hébert, C., Shepherd, L.A., Coull, N. and Lean, C.M. (2022) Measuring Developers’ Web Security Awareness from Attack and Defense Perspectives. 2022 IEEE Security and Privacy Workshops (SPW), San Francisco, 22-26 May 2022, 31-43.
|
[36]
|
Gupta, S. and Gupta, B.B. (2016) XSS-SAFE: A Server-Side Approach to Detect and Mitigate Cross-Site Scripting (XSS) Attacks in JavaScript Code. Arabian Journal for Science and Engineering, 41, 897-920. https://doi.org/10.1007/s13369-015-1891-7
|
[37]
|
Gupta, S. and Gupta, B.B. (2018) XSS-Secure as a Service for the Platforms of Online Social Network-Based Multimedia Web Applications in Cloud. Multimedia Tools and Applications, 77, 4829-4861.
https://link.springer.com/article/10.1007/s11042-016-3735-1
|
[38]
|
Gupta, B.B., Gupta, S. and Chaudhary, P. (2017) Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud. International Journal of Cloud Applications and Computing, 7, 1-31. https://doi.org/10.4018/IJCAC.2017010101
|
[39]
|
Caliwag, J.A., Pagaduan, R.A., Castillo, R.E. and Ramos, W.V.J. (2019) Integrating the Escaping Technique in Preventing Cross Site Scripting in an Online Inventory System. Proceedings of the 2019 2nd International Conference on Information Science and Systems, Tokyo, 16-19 March, 110-114.
https://doi.org/10.1145/3322645.3322696
|
[40]
|
Stritter, B., Freiling, F., König, H., Rietz, R., Ullrich, S., et al. (2016) Cleaning up Web 2.0’s Security Mess-At Least Partly. IEEE Security and Privacy, 14, 48-57.
https://doi.org/10.1109/MSP.2016.31
|
[41]
|
Singh, N., Meherhomji, V. and Chandavarkar, B.R. (2020) Automated versus Manual Approach of Web Application Penetration Testing. 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, 1-3 July 2020, 1-6. https://doi.org/10.1109/ICCCNT49239.2020.9225385
|
[42]
|
Calzavara, S., Rabitti, A. and Bugliesi, M. (2018) Semantics-Based Analysis of Content Security Policy Deployment. ACM Transactions on the Web, 12, Article No, 10.
https://doi.org/10.1145/3149408
|
[43]
|
Breck, E., Polyzotis, N., Roy, S., Whang, S.E. and Zinkevich, M. (2019) Data Validation for Machine Learning.
https://proceedings.mlsys.org/book/2019/file/5878a7ab84fb43402106c575658472fa-Paper.pdf
|
[44]
|
Serrano, M. and Prunet, V. (2016) A Glimpse of Hopjs. ACM SIGPLAN Notices, 51, 180-192. https://doi.org/10.1145/3022670.2951916
|
[45]
|
Rose, F., Toher, C., Gossett, E., Oses, C., Nardelli, M.B., Fornari, M., et al. (2017) AFLUX: The LUX Materials Search API for the AFLOW Data Repositories. Computational Materials Science, 137, 362-370.
https://doi.org/10.1016/j.commatsci.2017.04.036
|
[46]
|
Argyros, G., Stais, I., Kiayias, A. and Keromytis, A.D. (2016) Back in Black: Towards Formal, Black Box Analysis of Sanitizers and Filters. 2016 IEEE Symposium on Security and Privacy (SP), San Jose, 22-26 May 2016, 91-109.
https://ieeexplore.ieee.org/abstract/document/7546497
|
[47]
|
Pham, T.T.T., Hoang, V.N. and Ha, T.N. (2018) Exploring Efficiency of Character-Level Convolution Neuron Network and Long Short Term Memory on Malicious URL Detection. Proceedings of the 2018 VII International Conference on Network, Communication and Computing, Taipei, 14-16 December 2018, 82-86.
https://doi.org/10.1145/3301326.3301336
|
[48]
|
Zhang, Q., Chen, H. and Sun, J. (2010) An Execution-Flow Based Method for Detecting Cross-Site Scripting Attacks. The 2nd International Conference on Software Engineering and Data Mining, Chengdu, 23-25 June 2010, 160-165.
https://ieeexplore.ieee.org/abstract/document/5542934
|
[49]
|
Scholte, T., Robertson, W., Balzarotti, D. and Kirda, E. (2012) Preventing Input Validation Vulnerabilities Inweb Applications through Automated Type Analysis. Proceedings of International Computer Software and Applications Conference, Izmir, 16-20 July 2012, 233-243. https://doi.org/10.1109/COMPSAC.2012.34
|
[50]
|
Xiao, W., Sun, J., Chen, H. and Xu, X. (2014) Preventing Client Side XSS with Rewrite Based Dynamic Information Flow. Proceedings of International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), Beijing, 13-15 July 2014, 238-243. https://doi.org/10.1109/PAAP.2014.10
|
[51]
|
Stock, B., Pfistner, S., Kaiser, B., Lekies, S. and Johns, M. (2015) From Facepalm to Brain Bender: Exploring Client-Side Cross-Site Scripting. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, 12-16 October 2015, 1419-1430. https://doi.org/10.1145/2810103.2813625
|
[52]
|
Parameshwaran, I., Budianto, E., Shinde, S., Dang, H., Sadhu, A. and Saxena, P. (2015) DexterJS: Robust Testing Platform for DOM-Based XSS Vulnerabilities. Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, Bergamo, 30 August-4 September 2015, 946-949.
https://doi.org/10.1145/2786805.2803191
|
[53]
|
Usha, G., Kannimuthu, S., Mahendiran, P.D., Shanker, A.K. and Venugopal, D. (2020) Static Analysis Method for Detecting Cross Site Scripting Vulnerabilities. International Journal of Information and Computer Security, 13, 32-47.
https://doi.org/10.1504/IJICS.2020.108123
|
[54]
|
Wang, R., Jia, X., Li, Q. and Zhang, D. (2015) Improved N-Gram Approach for Cross-Site Scripting Detection in Online Social Network. 2015 Science and Information Conference (SAI), London, 28-30 July 2015, 1206-1212.
https://doi.org/10.1109/SAI.2015.7237298
|
[55]
|
Mokbal, F.M.M., Wang, D., Imran, A., Jiuchuan, L., Akhtar, F. and Wang, X. (2019) MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique. IEEE Access, 7, 100567-100580.
https://doi.org/10.1109/ACCESS.2019.2927417
|
[56]
|
Moniruzzaman, M., Bagirov, A., Gondal, I. and Brown, S. (2018) A Server Side Solution for Detecting WebInject: A Machine Learning Approach. Pacific-Asia Conference on Knowledge Discovery and Data Mining, Melbourne, 3 June 2018, 162-167.
https://doi.org/10.1007/978-3-030-04503-6_16
|
[57]
|
Tariq, I., Sindhu, M.A., Abbasi, R.A., Khattak, A.S., Maqbool, O. and Siddiqui, G.F. (2021) Resolving Cross-Site Scripting Attacks through Genetic Algorithm and Reinforcement Learning. Expert Systems with Applications, 168, Article ID: 114386.
https://doi.org/10.1016/j.eswa.2020.114386
|
[58]
|
Fang, Y., Huang, C., Xu, Y. and Li, Y. (2019) RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning. Future Internet, 11, Article 177. https://doi.org/10.3390/fi11080177
|
[59]
|
Fang, Y., Li, Y., Liu, L. and Huang, C. (2018) DeepXSS: Cross Site Scripting Detection Based on Deep Learning. Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, Chengdu, 12-14 March 2018, 47-51.
https://doi.org/10.1145/3194452.3194469
|
[60]
|
Kaur, G., Malik, Y., Samuel, H. and Jaafar, F. (2018) Detecting Blind Cross-Site Scripting Attacks Using Machine Learning. Proceedings of the 2018 International Conference on Signal Processing and Machine Learning, Shanghai, 28-30 November 2018, 22-25. https://doi.org/10.1145/3297067.3297096
|
[61]
|
Lekies, S., Stock, B. and Johns, M. (2013) 25 Million Flows Later: Large-Scale Detection of DOM-Based XSS. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, 4-8 November 2013, 1193-1204.
https://doi.org/10.1145/2508859.2516703
|
[62]
|
Van Acker, S., Nikiforakis, N., Desmet, L., Joosen, W. and Piessens, F. (2012) FlashOver: Automated Discovery of Cross-Site Scripting Vulnerabilities in Rich Internet Applications. Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, Seoul, 2-4 May 2012, 12-13.
https://doi.org/10.1145/2414456.2414462
|
[63]
|
Vishnu, B.A. and Jevitha, K.P. (2014) Prediction of Cross-Site Scripting Attack Using Machine Learning Algorithms. Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing, Amritapuri, October 2014, Article No. 55. https://doi.org/10.1145/2660859.2660969
|
[64]
|
Rocha, T.S. and Souto, E. (2014) ETSSDetector: A Tool to Automatically Detect Cross-Site Scripting Vulnerabilities. 2014 IEEE 13th International Symposium on Network Computing and Applications, Cambridge, 21-23 August 2014, 306-309.
https://doi.org/10.1109/NCA.2014.53
|
[65]
|
Khan, N., Abdullah, J. and Khan, A.S. (2015) Towards Vulnerability Prevention Model for Web Browser Using Interceptor Approach. 2015 9th International Conference on IT in Asia (CITA), Sarawak, 4-5 August 2015, 1-5.
https://doi.org/10.1109/CITA.2015.7349842
|
[66]
|
Ruse, M.E. and Basu, S. (2013) Detecting Cross-Site Scripting Vulnerability Using Concolic Testing. 2013 10th International Conference on Information Technology: New Generations, Las Vegas, 15-17 April 2013, 633-638.
https://doi.org/10.1109/ITNG.2013.97
|
[67]
|
Dong, G., Zhang, Y., Wang, X., Wang, P. and Liu, L. (2014) Detecting Cross Site Scripting Vulnerabilities Introduced by HTML5. 2014 11th International Joint Conference on Computer Science and Software Engineering (JCSSE), Chon Buri, 14-16 May 2014, 319-323. https://doi.org/10.1109/JCSSE.2014.6841888
|
[68]
|
Gupta, M.K., Govil, M.C., Singh, G. and Sharma, P. (2015) XSSDM: Towards Detection and Mitigation of Cross-Site Scripting Vulnerabilities in Web Applications. 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, 10-13 August 2015, 2010-2015.
https://doi.org/10.1109/ICACCI.2015.7275912
|
[69]
|
Duchene, F., Rawat, S., Richier, J.-L. and Groz, R. (2014) KameleonFuzz: Evolutionary Fuzzing for Black-Box XSS Detection. Proceedings of the 4th ACM Conference on Data and Application Security and Privacy, Association for Computing Machinery, San Antonio, March 2014, 37-48. https://doi.org/10.1145/2557547.2557550
|
[70]
|
Lalia, S. and Sarah, A. (2018) XSS Attack Detection Approach Based on Scripts Features Analysis. 2018 World Conference on Information Systems and Technologies, Naples, 27-29 March 2018, 197-207.
https://link.springer.com/chapter/10.1007/978-3-319-77712-2_19
|
[71]
|
Steinhauser, A. and Tůma, P. (2019) DjangoChecker: Applying Extended Taint Tracking and Server Side Parsing for Detection of Context-Sensitive XSS Flaws. Software: Practice and Experience, 49, 130-148. https://doi.org/10.1002/spe.2649
|
[72]
|
Gupta, S. and Gupta, B.B. (2018) A Robust Server-Side JavaScript Feature Injection-Based Design for JSP Web Applications Against XSS Vulnerabilities. In: Bokhari, M.U., Agrawal, N. and Saini, D., Eds., Cyber Security, Springer, Singapore, 459-465. https://link.springer.com/chapter/10.1007/978-981-10-8536-9_43
|
[73]
|
Gupta, S., Gupta, B.B. and Chaudhary, P. (2018) Hunting for DOM-Based XSS Vulnerabilities in Mobile Cloud-Based Online Social Network. Future Generation Computer Systems, 79, 319-336. https://doi.org/10.1016/j.future.2017.05.038
|
[74]
|
Nadji, Y., Saxena, P. and Song, D. (2009) Document Structure Integrity: A Robust Basis for Cross-Site Scripting Defense. National Down Syndrome Society, New York, 20.
http://webblaze.cs.berkeley.edu/papers/nadji-saxena-song.pdf
|
[75]
|
Panja, B., Gennarelli, T. and Meharia, P. (2015) Handling Cross Site Scripting Attacks Using Cache Check to Reduce Webpage Rendering Time with Elimination of Sanitization and Filtering in Light Weight Mobile Web Browser. 2015 1st Conference on Mobile and Secure Services (MOBISECSERV), Gainesville, 20-21 February 2015, 1-7. https://ieeexplore.ieee.org/abstract/document/7072878
|
[76]
|
Chaudhary, P., Gupta, B.B. and Gupta, S. (2018) Defending the OSN-Based Web Applications from XSS Attacks Using Dynamic JavaScript Code and Content Isolation. In: Kapur, P.K., Kumar, U. and Verma, A.K., Eds., Quality, IT and Business Operations: Modeling and Optimization, Springer, Singapore, 107-119.
https://doi.org/10.1007/978-981-10-5577-5_9
|
[77]
|
Gupta, S., Gupta, B.B. and Chaudhary, P. (2019) A Client-Server JavaScript Code Rewriting-Based Framework to Detect the XSS Worms from Online Social Network. Concurrency and Computation: Practice and Experience, 31, Article No. e4646.
https://doi.org/10.1002/cpe.4646
|