Web application security
View article
Bringing the web up to speed with WebAssembly Open
The maturation of the Web platform has given rise to sophisticated and demanding Web applications such as interactive 3D visualization, audio and video software, and games. With that, efficiency and security of code on the Web has become m…
View article
Web AR: A Promising Future for Mobile Augmented Reality—State of the Art, Challenges, and Insights Open
Mobile augmented reality (Mobile AR) is gaining increasing attention from both academia and industry. Hardware-based Mobile AR and App-based Mobile AR are the two dominant platforms for Mobile AR applications. However, hardware-based Mobil…
View article
Web Scraping or Web Crawling: State of Art, Techniques, Approaches and Application Open
Web scraping or web crawling refers to the procedure of automatic extraction of data from websites using software. It is a process that is particularly important in fields such as Business Intelligence in the modern age. Web scrapping is a…
View article
Web-Based Medical Appointment Systems: A Systematic Review Open
Overall, the literature suggests a growing trend for the adoption of Web-based appointment systems. The findings of this review suggest that there are benefits to a variety of patient outcomes from Web-based scheduling interventions with t…
View article
Toward the Next Wave of Services: Linked Services for the Web of Data Open
It has often been argued that Web services would have a tremendous impact on the Web, as a core enabling technology supporting a highly efficient service-based economy at a global scale. However, despite the outstanding progress in the are…
View article
A Survey on Web Tracking: Mechanisms, Implications, and Defenses Open
Privacy seems to be the Achilles' heel of today's web. Most web services make continuous efforts to track their users and to obtain as much personal information as they can from the things they search, the sites they visit, the people they…
View article
Web Phishing Detection Using a Deep Learning Framework Open
Web service is one of the key communications software services for the Internet. Web phishing is one of many security threats to web services on the Internet. Web phishing aims to steal private information, such as usernames, passwords, an…
View article
Formal Reasoning About the Security of Amazon Web Services Open
We report on the development and use of formal verification tools within Amazon Web Services (AWS) to increase the security assurance of its cloud infrastructure and to help customers secure themselves. We also discuss some remaining chall…
View article
Detecting Malicious URLs via a Keyword-Based Convolutional Gated-Recurrent-Unit Neural Network Open
With the continuous development of Web attacks, many web applications have been suffering from various forms of security threats and network attacks. The security detection of URLs has always been the focus of Web security. Many web applic…
View article
MLPXSS: An Integrated XSS-Based Attack Detection Scheme in Web Applications Using Multilayer Perceptron Technique Open
Dynamic web applications play a vital role in providing resources manipulation and interaction between clients and servers. The features presently supported by browsers have raised business opportunities, by supplying high interactivity in…
View article
Signature-based and Machine-Learning-based Web Application Firewalls: A Short Survey Open
Web Application Firewalls (WAF) have evolved to protect web applications from attack. A signature-based WAF responds to threats through the implementation of application-specific rules which block malicious traffic. However, these rules mu…
View article
An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications Open
Security and usability are often thought of as being contradictive in nature. One affects the other negatively. The relation and trade-offs between usability and security must be detected during developing web application to satisfy the us…
View article
CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy Open
Content Security Policy is a web platform mechanism designed to mitigate cross-site scripting (XSS), the top security vulnerability in modern web applications. In this paper, we take a closer look at the practical benefits of adopting CSP …
View article
A Comparative study of PHP frameworks performance Open
The increased demand for Web development has led to a high demand for efficiency, reliability, maintainability and scalability, which is why a PHP framework is an essential part of the web development toolbox. PHP frameworks are meant to f…
View article
Empirical Studies on Web Accessibility of Educational Websites: A Systematic Literature Review Open
Web accessibility means that people with some type of disability can make use of the Web in the same conditions as the rest of the people. When we talk about web accessibility, we refer to a web design and development that allows these peo…
View article
Challenges to Assess Accessibility in Higher Education Websites: A Comparative Study of Latin America Universities Open
The Web has revolutionized our daily lives, becoming a prime source of information, knowledge, inquiry, and provision of services in various areas. It is possible to obtain information easily from any institution through the Internet; in f…
View article
XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs Open
Social networking services (SNSs) such as Twitter, MySpace, and Facebook have become progressively significant with its billions of users. Still, alongside this increase is an increase in security threats such as crosssite scripting (XSS) …
View article
Comparing Web Accessibility Evaluation Tools and Evaluating the Accessibility of Webpages: Proposed Frameworks Open
With the growth of e-services in the past two decades, the concept of web accessibility has been given attention to ensure that every individual can benefit from these services without any barriers. Web accessibility is considered one of t…
View article
A Survey on Web Application Penetration Testing Open
Websites are becoming increasingly effective communication tools. Nevertheless, web applications are vulnerable to attack and can give attackers access to sensitive information or unauthorized access to accounts. The number of vulnerabilit…
View article
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities Open
As web applications become more prevalent, web security becomes more and more important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common injection web vulnerability. The exploitation of XSS vulnerabilities can hij…
View article
Web Accessibility Challenges Open
Despite the importance of web accessibility in recent years, websites remain partially or completely inaccessible to certain sectors of the population. This is due to several reasons, including web developers’ little or no experience in ac…
View article
Vulnerability Assessment in Heterogeneous Web Environment Using Probabilistic Arithmetic Automata Open
In the current scenario most of the business enterprises are running through web applications. But the major drawback is that they fail to provide a secure environment. To overcome this security issue in web applications, there are many vu…
View article
A Knowledge-Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications Open
There has been a phenomenal increase in the use of web applications in every facet of human endeavor. From education, healthcare, banking, business to governance and so much more now depends on secure web applications. This accelerated gro…
View article
Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks Open
New techniques and tactics are being used to gain unauthorized access to the web that harm, steal, and destroy information. Protecting the system from many threats such as DDoS, SQL injection, cross-site scripting, etc., is always a challe…
View article
SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN Open
An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security …
View article
Towards Lightweight URL-Based Phishing Detection Open
Nowadays, the majority of everyday computing devices, irrespective of their size and operating system, allow access to information and online services through web browsers. However, the pervasiveness of web browsing in our daily life does …
View article
Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting Open
Cross-site scripting (XSS) vulnerabilities are the most frequently reported web application vulnerability.As complex JavaScript applications become more widespread, DOM (Document Object Model) XSS vulnerabilities-a type of XSS vulnerabilit…
View article
A multi-level framework to identify HTTPS services Open
International audience
View article
Web phishing detection techniques: a survey on the state‐of‐the‐art, taxonomy and future directions Open
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with the increase in internet transactions, cybercrimes also increase rapidly. With the anonymous structure of the internet, attackers attempt t…
View article
A hybrid fuzzy rule-based multi-criteria framework for sustainable-security assessment of web application Open
The present day environment of cyber-attacks is a threat to even the most secure systems. With each passing day, the attackers are adapting new technologies to infiltrate systems and exploit even the minutest of the vulnerabilities. In suc…