Comparative analysis of open-source vulnerability assessment tools for campus area network

I Sharma, V Pahuja - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Vulnerability depicts the weakness in the system and it leads to risk in the extended form.
Network security professionals targets to work on vulnerabilities of the network for securing …

Enhancing Web Security: An Advanced Automated Kitterman Tool for Comprehensive Network Vulnerability Detection

R Sasikumar, CS Anita, D Rajalakshmi… - 2024 IEEE …, 2024 - ieeexplore.ieee.org
Strong security is essential in the ever-changing world of web applications to ward off
potential dangers. To identify various network vulnerabilities like Cross-Site Scripting …

ThreatScan-Strengthening Website Security with Predictive Analytics Using Machine Learning Model

E Hasan, H Das, NI Shourav, R Hossain… - 2024 IEEE Region …, 2024 - ieeexplore.ieee.org
ThreatScan is a machine learning-based approach proposed to strengthen website security
by predicting potential external attacks. Motivated by the growing cyber threats and reliance …

Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints

B Rexha, A Musa, K Vishi, E Martiri - arXiv preprint arXiv:2409.03791, 2024 - arxiv.org
Parallel to our physical activities our virtual presence also leaves behind our unique digital
fingerprints, while navigating on the Internet. These digital fingerprints have the potential to …

Leveraging AI for CTF Challenge Optimization

A Thaqi, A Musa, B Rexha - 2024 5th International Conference …, 2024 - ieeexplore.ieee.org
Capture the Flag (CTF) competitions have become integral to developing cybersecurity
skills, providing participants with real-world scenarios that challenge their problem-solving …

Guarding the Cloud: An Effective Detection of Cloud-Based Cyber Attacks using Machine Learning Algorithms.

B Rexha, R Thaqi, A Mazrekaj… - International Journal of …, 2023 - search.ebscohost.com
Cloud computing has gained significant popularity due to its reliability and scalability,
making it a compelling area of research. However, this technology is not without its …

Performance Analysis of Vulnerability Detection Tools and Techniques

KK Pareek, GK Ameta - 2024 Parul International Conference on …, 2024 - ieeexplore.ieee.org
In today's world security is a major concern. To strengthen security, organizations are
investing huge amounts of money for incorporating different tools and techniques …

Machine Learning Boosted Trees Algorithms in Cybersecurity: A Comprehensive Review

V Bytyqi, B Rexha - Future of Information and Communication Conference, 2024 - Springer
In the ever-evolving landscape of cybersecurity, the integration of machine learning
algorithms has become imperative to effectively detect and prevent cyber-attacks. This paper …

Machine Learning-Based Detection and Mitigation of XML SQL Injection Attacks

V Pahuja, R Dubey, I Sharma - 2023 Global Conference on …, 2023 - ieeexplore.ieee.org
XML and SQL injection attacks are occurring very frequently nowadays as developers lack
major security measures and awareness for the purpose of securing web applications and …

Tendencia en las vulnerabilidades CSRF entre 2018 y 2024

D Bonilla Mosquera, JF Gonzalez Lopez… - Serie Científica de la …, 2024 - scielo.sld.cu
El objetivo de la investigación fue analizar las vulnerabilidades de ataques Cross-site
Request Forgery (CSRF), se revisó datos estadísticos recientes y reportes internacionales …