Tumbe Group of International Journals


  1. Anderson, J.P. Computer Security Threat Monitoring and Surveillance; Technical Report; James P. Anderson Company: Philadelphia, PA , USA, 1980.
  2. Michie, D.; Spiegelhalter, D.J.; Taylor, C. Machine Learning, Neural and Statistical Classification; Ellis Horwood Series in Artificial Intelligence: New York, NY, USA, 1994; Volume 13.
  3. Xu, W., Zhang, F., Zhu, S.: JStill: mostly static detection of obfuscated malicious JavaScript code. In: Data and Application Security and Privacy, pp. 117–128. ACMPress (2013).
  4. Weinberger, J., Saxena, P., Akhawe, D., Finifter, M., Shin, R., Song, D.: A systematic analysis of XSS sanitization in web application frameworks. In: EuropeanSymposium on Research in Computer Security. Lecture Notes in Computer Science, vol. 6879, pp. 150–171. Springer (2011)
  5. Williams, J., Manico, J., Mattatall, N.: Cross-site Scripting (XSS). https://www.owasp.org/index.php/Cross-site Scripting (XSS).Accessed 22 July 2016.
  6. Van Gundy, M., Chen, H.: Noncespaces: using randomization to defeat cross-site scripting attacks. Comput.Secur. 31(4), 612–628 (2012)
  7. Kirda, E., Kruegel, C., Vigna, G., Jovanovic, N.: Noxes: a client-side solution for mitigating cross-site scripting attacks. In: Symposium on Applied Computing, pp.330–337.ACM Press (2006).
  8. Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross site scripting prevention with dynamic data tainting and static analysis. In: Networkand Distributed System Security Symposium, p. 12. Internet Society (2007).
  9. Komiya, R., Paik, I., Hisada, M.: Classification of malicious web code by machine learning. In: Awareness Science & Technology (iCAST), pp. 406–411. IEEE (2011)
  10. Likarish, P., Jung, E., Jo, I.: Obfuscated malicious JavaScript detection using clas-sification techniques. In: Malicious and Unwanted Software (MALWARE), pp. 47-54. IEEE (2009).
  11. Examples of malicious javascript (2014). https://aw-snap.info/articles/js-examples.php. Accessed 16 Dec 2016.
  12. Karnad, K.: XSS payloads you may need as a pen-tester (2014). https://www.linkedin.com/pulse/20140812222156-79939846-xss- vectors-you-may-need-as-a-pen-tester. Accessed 25 Dec 2016.
  13. XSS Payloads: XSS payloads you may need as a pen-tester. http://www.xss-payloads.com/payloads.html. Accessed 14 Oct 2016.
  14. Fernandez, K., Pagkalos, D.: XSS (Cross-Site Scripting) information and vulnerablewebsites archive.

Sign In  /  Register

Most Downloaded Articles

Acquire employability in Indian Sinario

The Pink Sonnet

Department of Mathematics @ GFGC Tumkur

ಗ್ರಾಮೀಣ ಪ್ರದೇಶದಲ್ಲಿ ಆಯಗಾರಿಕೆ ಸಂಸ್ಕೃತಿ

Knowledge and Education- At Conjecture

© 2018. Tumbe International Journals . All Rights Reserved. Website Designed by ubiJournal