[HTML][HTML] Machine and deep learning-based xss detection approaches: a systematic literature review

IK Thajeel, K Samsudin, SJ Hashim… - Journal of King Saud …, 2023 - Elsevier
Web applications are paramount tools for facilitating services providing in the modern world.
Unfortunately, the tremendous growth in the web application usage has resulted in a rise in …

Analyzing Small Business Strategies to Prevent External Cybersecurity Threats

KE Moore - 2023 - search.proquest.com
Some small businesses' cybersecurity analysts lack strategies to prevent their organizations
from compromising personally identifiable information (PII) via external cybersecurity threats …

DualAC2NN: Revisiting and Alleviating Alert Fatigue from the Detection Perspective

G Yang, C Tang, X Liu - Symmetry, 2022 - mdpi.com
The exponential expansion of Internet interconnectivity has led to a dramatic increase in
cyber-attack alerts, which contain a considerable proportion of false positives. The …

No features needed: Using bpe sequence embeddings for web log anomaly detection

NS Sehwani - Proceedings of the 2022 ACM on International …, 2022 - dl.acm.org
Problem: Manual data analysis for extracting useful features in web log anomaly detection
can be costly and time-consuming. Automated techniques on the other hand (eg Auto …

A Comprehensive Review on Transforming Security and Privacy with NLP

R Garg, A Gupta, A Srivastava - … on Cryptology & Network Security with …, 2023 - Springer
The revolutionary field of natural language processing has broad implications for privacy
and safety. This article reviews the wide range of natural language processing uses for …

Outlier detection using conditional information entropy and rough set theory

Z Li, S Wei, S Liu - Journal of Intelligent & Fuzzy Systems, 2024 - content.iospress.com
Outlier detection is critically important in the field of data mining. Real-world data have the
impreciseness and ambiguity which can be handled by means of rough set theory …

Deep Learning Methods in Web Intrusion Detection: A Systematic Review

HI Halim, M Kholief, F Maghraby - 2022 - researchsquare.com
Web application and services are essential part of the internet. They automate many people
activities such as purchasing goods, communica-tion, socialization, and political voting …

Інформаційна технологія динамічної пріоритезації вхідного трафіку в умовах нестачі обчислювальних ресурсів

МР Наталуха - 2023 - essuir.sumdu.edu.ua
Розроблено інформаційну технологію динамічної пріоритезації трафіку та
імплементовано у як конфігурацію модуля для застосунку NGINX який використовує …

[PDF][PDF] Facial Image Feature Extraction Using Radial Basis Function Neural Network and Adaptive SIFT-SURF Algorithm.

VA Akpan, JB Agbogun - African Journal of Computing & ICT, 2021 - afrjcict.net
This paper presents a novel facial image feature extraction technique using radial basis
function neural network (RBFNN) and adaptive SIFT-SURF algorithm specifically for facial …