Chughtai et al., 2024 - Google Patents
Deep learning trends and future perspectives of web security and vulnerabilitiesChughtai et al., 2024
View PDF- Document ID
- 14068984863245617976
- Author
- Chughtai M
- Bibi I
- Karim S
- Shah S
- Laghari A
- Khan A
- Publication year
- Publication venue
- Journal of High Speed Networks
External Links
Snippet
Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce …
- 238000013135 deep learning 0 title description 56
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Abikoye et al. | A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm | |
| US11621953B2 (en) | Dynamic risk detection and mitigation of compromised customer log-in credentials | |
| Kumari et al. | Verification and validation techniques for streaming big data analytics in internet of things environment | |
| US20210058395A1 (en) | Protection against phishing of two-factor authentication credentials | |
| US20190243951A1 (en) | Stateless web content anti-automation | |
| US20200053111A1 (en) | Artifact modification and associated abuse detection | |
| Díaz de León Guillén et al. | A systematic review of security threats and countermeasures in SaaS | |
| Ávila et al. | Use of security logs for data leak detection: a systematic literature review | |
| Gupta et al. | Cross-site scripting attacks: classification, attack, and countermeasures | |
| Qazi | Application programming interface (API) security in cloud applications | |
| US11470114B2 (en) | Malware and phishing detection and mediation platform | |
| Ahmed et al. | PhishCatcher: client-side defense against web spoofing attacks using machine learning | |
| TAMER | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
| Kellezi et al. | Securing Open Banking with Model‐View‐Controller Architecture and OWASP | |
| Chughtai et al. | Deep learning trends and future perspectives of web security and vulnerabilities | |
| Aswathy et al. | Privacy breaches through cyber vulnerabilities: Critical issues, open challenges, and possible countermeasures for the future | |
| Rana et al. | Ransomware attacks in cyber-physical systems: Countermeasure of attack vectors through automated web defenses | |
| Gehling et al. | eCommerce security | |
| Kshetri et al. | algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms | |
| Perumal et al. | Cybercrime issues in smart cities networks and prevention using ethical hacking | |
| Shahriar et al. | Mobile anti-phishing: Approaches and challenges | |
| Zhao et al. | Network security model based on active defense and passive defense hybrid strategy | |
| Debnath et al. | A comprehensive survey on mobile browser security issues, challenges and solutions | |
| Carlini et al. | LLMs unlock new paths to monetizing exploits | |
| Varshney et al. | Detecting spying and fraud browser extensions: Short paper |