Mathematical algorithm for detecting XSS attacks on web applications
Saved in:
| Date: | 2021 |
|---|---|
| Main Authors: | Kh. Khamdamov, K. F. Kerimov |
| Format: | Article |
| Language: | English |
| Published: |
2021
|
| Series: | International Scientific Technical Journal «Problems of Control and Informatics» |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001264495 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Methods of blocking the vulnerabilities of the XSS type based on service-oriented architecture
by: Kh. Khamdamov, et al.
Published: (2019)
by: Kh. Khamdamov, et al.
Published: (2019)
Database protection based on web application firewall
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Method of developing a web-application brandmauer
by: Kh. Khamdamov, et al.
Published: (2019)
by: Kh. Khamdamov, et al.
Published: (2019)
Automatic detection algorithm for vulnerability of SQL-injection
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Detection and avoidance of input validation attacks in web application using deterministic push down automata
by: V. Nitja, et al.
Published: (2019)
by: V. Nitja, et al.
Published: (2019)
A three-layer defense mechanism based on web servers against distributed denial of service attacks
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Modeling of Attack Detection System based on Hybridization of Binary Classifiers
by: O. I. Belei, et al.
Published: (2020)
by: O. I. Belei, et al.
Published: (2020)
Математический алгоритм обнаружения XSS-атак на веб-приложения
by: Хамдамов, Р.Х., et al.
Published: (2021)
by: Хамдамов, Р.Х., et al.
Published: (2021)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
Algorithm for improving interpretability of support vector models for anomaly detection in network traffic
by: Kerimov, K., et al.
Published: (2025)
by: Kerimov, K., et al.
Published: (2025)
Genetic algorithm for SDN protection against network attacks
by: S. I. Zabelin
Published: (2016)
by: S. I. Zabelin
Published: (2016)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
An algorithm for segmentation of symbols of a vehicle license plate
by: Kh. Khamdamov, et al.
Published: (2019)
by: Kh. Khamdamov, et al.
Published: (2019)
Construction of a multi-agent attack detection system based on artificial intelligence models
by: O. Belej, et al.
Published: (2021)
by: O. Belej, et al.
Published: (2021)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2022)
by: Gorbatiuk, V.O., et al.
Published: (2022)
Application of myriad filtering in real-time trend detection algorithms
by: Tulyakova, N., et al.
Published: (2024)
by: Tulyakova, N., et al.
Published: (2024)
A discrete mathematical model SIRS with the evolution of regions to attack infectious diseases
by: Y. Benfatah, et al.
Published: (2023)
by: Y. Benfatah, et al.
Published: (2023)
Application the Aho-Corasick Algorithm for Improving a Intrusion Detection System
by: M. M. Karimov, et al.
Published: (2021)
by: M. M. Karimov, et al.
Published: (2021)
Algorithms of relationships and dependencies search in Web-pages
by: A. M. Hlybovets
Published: (2016)
by: A. M. Hlybovets
Published: (2016)
Algorithms of relationships and dependencies search in Web-pages
by: Glybovets, A.M.
Published: (2018)
by: Glybovets, A.M.
Published: (2018)
Database protection based on web application firewall
by: A. V. Oletskij, et al.
Published: (2021)
by: A. V. Oletskij, et al.
Published: (2021)
Mathematical Simulation of Ultra Wideband Signals Scattered by Mines Buried in Ground. Algorithms of Mine Detection and Identification
by: Sukharevsky, O.I., et al.
Published: (2002)
by: Sukharevsky, O.I., et al.
Published: (2002)
Mathematical Simulation of Ultra Wideband Signals Scattered by Mines Buried in Ground. Algorithms of Mine Detection and Identification
by: Sukharevsky, O. I., et al.
Published: (2013)
by: Sukharevsky, O. I., et al.
Published: (2013)
Algorithm for Detection and Identification of Slow Targets
by: Sytnik, O. V.
Published: (2013)
by: Sytnik, O. V.
Published: (2013)
Hemostasis indices in transient ischemic attacks
by: I. A. Hryhorova, et al.
Published: (2021)
by: I. A. Hryhorova, et al.
Published: (2021)
Distinguishing attack on the NTRUCipher encryption scheme
by: A. M. Oleksiichuk, et al.
Published: (2022)
by: A. M. Oleksiichuk, et al.
Published: (2022)
Development of applications in service-oriented architecture of Semantic Web
by: Deretskiy, V.A.
Published: (2025)
by: Deretskiy, V.A.
Published: (2025)
Mathematical model of photoacoustic microscopy with piezoelectric detection
by: Vertsanova, E.V., et al.
Published: (1999)
by: Vertsanova, E.V., et al.
Published: (1999)
General algorithm of computation of c-table and detection of valleys
by: Gilewicz, J., et al.
Published: (2010)
by: Gilewicz, J., et al.
Published: (2010)
General algorithm of computation of $c$-table and detection of valleys
by: Gilewicz, J., et al.
Published: (2010)
by: Gilewicz, J., et al.
Published: (2010)
Neural Network System for Transient Ischemic Attacks Diagnostics
by: V. A. Golovko, et al.
Published: (2014)
by: V. A. Golovko, et al.
Published: (2014)
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019)
by: V. D. Havlovskyi
Published: (2019)
Research on methods of building an interactive map in a web application
by: Katerynych, L.O., et al.
Published: (2023)
by: Katerynych, L.O., et al.
Published: (2023)
Research on methods of building an interactive map in a web application
by: Katerynych, L.O., et al.
Published: (2022)
by: Katerynych, L.O., et al.
Published: (2022)
Web-GIS application for managing spatial paleo-geographic data
by: O. V. Matsibora
Published: (2019)
by: O. V. Matsibora
Published: (2019)
Analytical review on information retrieval methods and applications in the Semantic Web
by: Yu. Hryshanova
Published: (2016)
by: Yu. Hryshanova
Published: (2016)
Analytical review on information retrieval methods and applications in the Semantic Web
by: Grishanova, I.J.
Published: (2018)
by: Grishanova, I.J.
Published: (2018)
Synthesis of algorithms for recognition of vulnerabilities in web-resources through signatures of fuzzy linguistic features
by: O. A. Iliashov
Published: (2017)
by: O. A. Iliashov
Published: (2017)
Construction of subsystem determination of attacks in cyberphysical systems by neural network methods
by: O. Belej, et al.
Published: (2021)
by: O. Belej, et al.
Published: (2021)
Similar Items
-
Methods of blocking the vulnerabilities of the XSS type based on service-oriented architecture
by: Kh. Khamdamov, et al.
Published: (2019) -
Database protection based on web application firewall
by: Kh. Khamdamov, et al.
Published: (2021) -
Method of developing a web-application brandmauer
by: Kh. Khamdamov, et al.
Published: (2019) -
Automatic detection algorithm for vulnerability of SQL-injection
by: A. T. Rakhmanov, et al.
Published: (2019) -
Detection and avoidance of input validation attacks in web application using deterministic push down automata
by: V. Nitja, et al.
Published: (2019)