High-Speed Network DDoS Attack Detection: A Survey

RMA Haseeb-Ur-Rehman, AHM Aman, MK Hasan… - Sensors, 2023 - mdpi.com
Having a large number of device connections provides attackers with multiple ways to attack
a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can …

[PDF][PDF] Front-end development and cybersecurity: A conceptual approach to building secure web applications

HO Ekpobimi, RC Kandekere… - Computer Science & IT …, 2024 - researchgate.net
Cybersecurity has become a critical concern in the digital age, where the proliferation of web
applications has created new opportunities for innovation and economic growth (Möller …

[HTML][HTML] An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0

O Chakir, A Rehaimi, Y Sadqi, M Krichen… - Journal of King Saud …, 2023 - Elsevier
Cybersecurity attacks that target software have become profitable and popular targets for
cybercriminals who consciously take advantage of web-based vulnerabilities and execute …

Classification of cyber security threats on mobile devices and applications

MA Almaiah, A Al-Zahrani, O Almomani… - Artificial intelligence and …, 2021 - Springer
Mobile devices and applications are prone to different kinds of cyber threats and attacks that
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …

Twenty-two years since revealing cross-site scripting attacks: a systematic mapping and a comprehensive survey

A Hannousse, S Yahiouche, MC Nait-Hamoud - Computer Science Review, 2024 - Elsevier
Cross-site scripting (XSS) is one of the major threats menacing the privacy of data and the
navigation of trusted web applications. Since its disclosure in late 1999 by Microsoft security …

Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners

K Abdulghaffar, N Elmrabit, M Yousefi - Computers, 2023 - mdpi.com
Penetration testers have increasingly adopted multiple penetration testing scanners to
ensure the robustness of web applications. However, a notable limitation of many scanning …

Social Networking Security during COVID‐19: A Systematic Literature Review

R Abid, M Rizwan, P Veselý, A Basharat… - Wireless …, 2022 - Wiley Online Library
During the Covid‐19 Pandemic, the usage of social media networks increased
exponentially. People engage in education, business, shopping, and other social activities …

Distributed web hacking by adaptive consensus-based reinforcement learning

N Ilić, D Dašić, M Vučetić, A Makarov, R Petrović - Artificial Intelligence, 2024 - Elsevier
In this paper, we propose a novel adaptive consensus-based learning algorithm for
automated and distributed web hacking. We aim to assist ethical hackers in conducting …

Systematic literature review on security misconfigurations in web applications

SL Martins, FM Cruz, RP Araújo… - International Journal of …, 2024 - Taylor & Francis
Security misconfigurations are unintentional errors that can lead to vulnerabilities in
applications, compromising an organization's safety. This article aims to provide a …

Conceptualizing inclusive marketing: A synthesis of theory and practice

C Grieco - European Management Journal, 2024 - Elsevier
Fostering inclusion is a currently popular marketing imperative to which firms, policies, and
individuals are giving increasing attention. Various brands are striving to join this trend in …