Search Results - untrusted JavaScript code*
-
1
Authors:
Source: Proceedings of the Workshop on JavaScript Tools. :1-10
Subject Terms: Web Mashups, Web Application Security, 0202 electrical engineering, electronic engineering, information engineering, Untrusted, 02 engineering and technology
-
2
Authors:
Source: Springer Proceedings in Business and Economics ISBN: 9789811055768
Subject Terms: 3. Good health
-
3
Authors:
Source: Concurrency and Computation: Practice and Experience. 31
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
4
Authors:
Source: Gupta , B B , Chaudhary , P & Gupta , S 2020 , ' Designing a XSS defensive framework for web servers deployed in the existing smart city infrastructure ' , Journal of Organizational and End User Computing , vol. 32 , no. 4 , pp. 85-111 . https://doi.org/10.4018/JOEUC.2020100105
Subject Terms: Smart City Cyber Security, Trusted Remark Statement Injection, Untrusted Javascript Code, XSS Attack
File Description: application/pdf
-
5
Authors:
Source: 2009 22nd IEEE Computer Security Foundations Symposium. :77-91
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Access URL: http://crypto.stanford.edu/websec/jsPapers/csf09-camera-ready.pdf
https://ieeexplore.ieee.org/document/5230484/
http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000005230484
http://crest.cs.ucl.ac.uk/cow/12/slides/SergioCOW-2011.pdf
http://theory.stanford.edu/~ataly/Talks/JSIsol-CS258.pdf
http://www-cs-students.stanford.edu/~ataly/Papers/csf09.pdf
https://dblp.uni-trier.de/db/conf/csfw/csf2009.html#MaffeisT09 -
6
Authors: Phung, Phu, 1979
Subject Terms: self-protecting JavaScript, ECMAScript 5, mashup security, sandbox, Untruste JavaScript
Access URL: https://research.chalmers.se/publication/146091
-
7
Authors:
Source: Security & Communication Networks; 11/25/2016, Vol. 9 Issue 17, p3966-3986, 21p
Subject Terms: HTTP (Computer network protocol), PERFORMANCE evaluation, CONTEXT-aware computing, WEB-based user interfaces
Reviews & Products: GOOGLE Chrome (Computer software)
-
8
Authors: James Padolsey
Resource Type: eBook.
Subjects: JavaScript (Computer program language)
Categories: COMPUTERS / Internet / Web Programming, COMPUTERS / Programming / Algorithms, COMPUTERS / User Interfaces
-
9
Authors:
Source: Concurrency & Computation: Practice & Experience; 11/10/2019, Vol. 31 Issue 21, pN.PAG-N.PAG, 1p
-
10
Authors:
Source: ACM Computing Surveys; Sep2025, Vol. 57 Issue 9, p1-36, 36p
-
11
Authors: Wingo, Andy
Source: Communications of the ACM; Nov2025, Vol. 68 Issue 11, p50-54, 5p
-
12
Authors: et al.
Source: Journal of the ACM; Feb2024, Vol. 71 Issue 1, p1-59, 59p
-
13
Authors:
Source: ACM Transactions on Privacy & Security; Feb2024, Vol. 27 Issue 1, p1-37, 37p
-
14
Authors: et al.
Source: Communications of the ACM; Jan2010, Vol. 53 Issue 1, p91-99, 9p, 2 Diagrams, 2 Charts, 1 Graph
-
15
Authors:
Source: ACM Computing Surveys; Dec2025, Vol. 57 Issue 12, p1-32, 32p
-
16
Authors: Phung, Phu, 1979
Subject Terms: security policy enforcement, JavaScript security, web-application security, vehicle software security, untrusted software
File Description: electronic
-
17
Authors: et al.
Source: Communications of the ACM; Sep2011, Vol. 54 Issue 9, p91-99, 9p, 3 Diagrams, 5 Charts
-
18
Authors:
Source: Multimedia Tools & Applications; Feb2018, Vol. 77 Issue 4, p4829-4861, 33p
-
19
Authors: LAU, JASON
Source: ISACA Journal; 2025, Vol. 6, p20-25, 6p
-
20
Authors:
Source: Journal of Cybersecurity (2579-0072); 2025, Vol. 7 Issue 1, p1-20, 20p
Nájsť tento článok vo Web of Science
Full Text Finder