The detection of feasible paths helps to minimize the false positive rate. However, the previous works did not consider the feasibility of the program paths during the analysis …
HV Le, HP Du, HN Nguyen… - … Journal of Web and …, 2022 - inderscienceonline.com
The popularity of today's web application has led to web servers frequently the objects of webshell attacks. In this paper, we propose a new deep inspection method that is composed …
Q Wang, W Zhao, J Ren - Journal of Intelligent & Fuzzy …, 2021 - content.iospress.com
Abstract Intrusion Detection System (IDS) can reduce the losses caused by intrusion behaviors and protect users' information security. The effectiveness of IDS depends on the …
A Saxena, A Arora, S Saxena… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
For a long time, online attacks were regarded to pose a severe threat to web-based applications, websites, and clients. It can bypass authentication methods, steal sensitive …
I Deli, HV Long, LH Son, R Kumar… - Journal of Intelligent & …, 2020 - content.iospress.com
Soft set is the power tool to deal with uncertainty in a parametric manner. In applications of soft set, one of the most important steps is to define mappings on soft sets. In this study, we …
IJ Jacob, B Paulraj, PE Darney, HV Long… - International Journal of …, 2021 - igi-global.com
Methods to retrieve images involve retrieving images from the database by using features of it. They are colour, shape, and texture. These features are used to find the similarity for the …
This chapter provides a comprehensive analysis of web application vulnerability scanners, examining their characteristics, effectiveness, and implications for web security. Through a …
During the last years, the number of cyberattacks, especially on web applications, has been increasing. Cyber agents target both large and small companies, which is why it is …
Z Xiong, J Ye - … on Cognitive based Information Processing and …, 2023 - Springer
With the continuous development of internet technology, web applications are becoming more and more popular, and the resulting open-source code vulnerability intrusion problems …