Chughtai et al., 2024 - Google Patents
Deep learning trends and future perspectives of web security and vulnerabilitiesChughtai et al., 2024
View PDF- Document ID
- 14068984863245617976
- Author
- Chughtai M
- Bibi I
- Karim S
- Shah S
- Laghari A
- Khan A
- Publication year
- Publication venue
- Journal of High Speed Networks
External Links
Snippet
Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce …
- 238000013135 deep learning 0 title description 56
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abikoye et al. | A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm | |
US11621953B2 (en) | Dynamic risk detection and mitigation of compromised customer log-in credentials | |
Kumari et al. | Verification and validation techniques for streaming big data analytics in internet of things environment | |
Alani | Big data in cybersecurity: a survey of applications and future trends | |
US20210058395A1 (en) | Protection against phishing of two-factor authentication credentials | |
US20190243951A1 (en) | Stateless web content anti-automation | |
US20200053111A1 (en) | Artifact modification and associated abuse detection | |
US20210203693A1 (en) | Phishing detection based on modeling of web page content | |
Gupta et al. | Cross-site scripting attacks: classification, attack, and countermeasures | |
Ávila et al. | Use of security logs for data leak detection: a systematic literature review | |
Kellezi et al. | Securing Open Banking with Model‐View‐Controller Architecture and OWASP | |
US11470114B2 (en) | Malware and phishing detection and mediation platform | |
Ahmed et al. | PhishCatcher: client-side defense against web spoofing attacks using machine learning | |
Nagpal et al. | SECSIX: security engine for CSRF, SQL injection and XSS attacks | |
Chughtai et al. | Deep learning trends and future perspectives of web security and vulnerabilities | |
Aswathy et al. | Privacy breaches through cyber vulnerabilities: Critical issues, open challenges, and possible countermeasures for the future | |
Rana et al. | Ransomware attacks in cyber-physical systems: countermeasure of attack vectors through automated web defenses | |
Gehling et al. | eCommerce security | |
Perumal et al. | Cybercrime issues in smart cities networks and prevention using ethical hacking | |
Kshetri et al. | algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms | |
Shahriar et al. | Mobile anti-phishing: Approaches and challenges | |
Debnath et al. | A comprehensive survey on mobile browser security issues, challenges and solutions | |
Zhao et al. | Network security model based on active defense and passive defense hybrid strategy | |
Varshney et al. | Detecting spying and fraud browser extensions: Short paper | |
Qiu et al. | Covering the Monitoring Network: A Unified Framework to Protect E‐Commerce Security |