[PDF][PDF] Secured web application based on CapsuleNet and OWASP in the cloud

R Vallabhaneni, S Pillai, SA Vaddadi… - Indonesian Journal of …, 2024 - researchgate.net
The tremendous use of sensitive and consequential information in the advanced web
application confronts the security issues. To defend the web application while it processing …

E-WebGuard: Enhanced neural architectures for precision web attack detection

L Zhou, WC Yau, YS Gan, ST Liong - Computers & Security, 2025 - Elsevier
Web applications have become a favored tool for organizations to disseminate vast amounts
of information to the public. With the increasing adoption and inherent openness of these …

Detecting command injection attacks in web applications based on novel deep learning methods

X Wang, J Zhai, H Yang - Scientific Reports, 2024 - nature.com
Web command injection attacks pose significant security threats to web applications, leading
to potential server information leakage or severe server disruption. Traditional detection …

A Comprehensive Evaluation of Machine Learning Algorithms for Web Application Attack Detection with Knowledge Graph Integration

M Ismail, S Alrabaee, KKR Choo, L Ali… - Mobile Networks and …, 2024 - Springer
The capability to accurately detect web application attacks, especially in a timely fashion, is
crucial but remains an ongoing challenge. This study provides an in-depth evaluation of 19 …

[PDF][PDF] Detecting XSS with Random Forest and Multi-Channel Feature Extraction.

Q Qin, Y Li, Y Mi, J Shen, K Wu… - Computers, Materials & …, 2024 - cdn.techscience.cn
In the era of the Internet, widely used web applications have become the target of hacker
attacks because they contain a large amount of personal information. Among these …

Browser Security Comparison Using Cookie Analysis

C Han, Q Niyaz, A Javaid - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
The internet has become a significant part of our lives, impacting society in various ways. An
increasing number of people are using the internet, bringing both positive and negative …

Methods and models of decision-making regarding energy saving in communal facilities based on Delphi method

O Derevenko, O Kravchenko, S Bronin… - 2024 IEEE 4th …, 2024 - ieeexplore.ieee.org
The issue of enterprise energy efficiency is very important for many state structures. Due to
budget limits and access to certain technologies, there are cases where the company must …

Tackling Threats: A Study of Vulnerability Testing and Mitigation in Web Applications

MI Shaikh, PS Lokhande - Available at SSRN 4823623, 2024 - papers.ssrn.com
The abstract of the study" Tackling Threats: A Study of Vulnerability Testing and Mitigation in
Web Applications" delves into the pressing significance of web application security within …

Blockchain or AI: Web Applications Security Mitigations

V Diyora, N Savani - 2024 First International Conference on …, 2024 - ieeexplore.ieee.org
Given the rapid advancement of web applications and the increasing importance of web
security, it is crucial to prioritize web security as a fundamental aspect of ensuring a secure …

Analisis Kerentanan Cross Site Scripting (XSS): Metode Serangan, Dampak, dan Strategi Pengamanan

NM Kevin - Prosiding Seminar Nasional Informatika, 2024 - conference.upgris.ac.id
Abstract Cross Site Scripting (XSS) attacks pose a significant threat to web security, with the
potential to disrupt web performance, steal sensitive user information, and even take full …