Search Results - untrusted JavaScript code~
-
1
Authors:
Source: Springer Proceedings in Business and Economics ISBN: 9789811055768
Subject Terms: 3. Good health
-
2
Authors:
Source: Concurrency and Computation: Practice and Experience. 31
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
3
Authors:
Source: Gupta , B B , Chaudhary , P & Gupta , S 2020 , ' Designing a XSS defensive framework for web servers deployed in the existing smart city infrastructure ' , Journal of Organizational and End User Computing , vol. 32 , no. 4 , pp. 85-111 . https://doi.org/10.4018/JOEUC.2020100105
Subject Terms: Smart City Cyber Security, Trusted Remark Statement Injection, Untrusted Javascript Code, XSS Attack
File Description: application/pdf
-
4
Authors: Salim, Djiar
Subject Terms: Trigger-action, Untrusted code execution, JavaScript sandbox, WebAssembly isolation, Trigger-aktion, Exekveringavopålitligkod, JavaScript-sandlåda, WebAssemblyisolering, Computer Sciences, Datavetenskap (datalogi)
File Description: application/pdf
Relation: TRITA-EECS-EX ; 2022:642
Availability: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-321994
-
5
Authors:
Source: Security & Communication Networks; 11/25/2016, Vol. 9 Issue 17, p3966-3986, 21p
Subject Terms: HTTP (Computer network protocol), PERFORMANCE evaluation, CONTEXT-aware computing, WEB-based user interfaces
Reviews & Products: GOOGLE Chrome (Computer software)
-
6
Authors:
Source: Concurrency & Computation: Practice & Experience; 11/10/2019, Vol. 31 Issue 21, pN.PAG-N.PAG, 1p
-
7
Authors: et al.
Source: Communications of the ACM; Sep2011, Vol. 54 Issue 9, p91-99, 9p, 3 Diagrams, 5 Charts
-
8
Authors:
Source: Multimedia Tools & Applications; Feb2018, Vol. 77 Issue 4, p4829-4861, 33p
-
9
Authors:
Source: Journal of Computer Security; 2014, Vol. 22 Issue 4, p511-565, 55p
-
10
Authors: Phung, Phu, 1979
Subject Terms: security policy enforcement, JavaScript security, web-application security, vehicle software security, untrusted software
File Description: electronic
-
11
Authors: Phung, Phu, 1979
Subject Terms: self-protecting JavaScript, ECMAScript 5, mashup security, sandbox, Untruste JavaScript
Access URL: https://research.chalmers.se/publication/146091
-
12
Authors:
Source: JSTools '12 Proceedings of the Workshop on JavaScript Tools, Beijing,13 June, 2012. :1-10
Subject Terms: Web application security, Web mashups, Fine-grained security policy, Untrusted
Access URL: https://research.chalmers.se/publication/168610
-
13
Authors:
Source: Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ); Mar2016, Vol. 41 Issue 3, p897-920, 24p
-
14
Authors: et al.
Source: Journal of Computer Security; 2020, Vol. 28 Issue 3, p375-404, 30p
Subject Terms: MOBILE apps, MOBILE operating systems, JAVASCRIPT programming language, ACCESS control
Geographic Terms: CORDOBA (Spain)
Reviews & Products: ANDROID (Operating system)
-
15
Authors: et al.
Source: Communications of the ACM; Feb2009, Vol. 52 Issue 2, p79-87, 9p, 1 Diagram, 5 Charts
-
16
Authors: Rob Miles
Resource Type: eBook.
Categories: COMPUTERS / Programming / General, COMPUTERS / Languages / JavaScript, COMPUTERS / Distributed Systems / Client-Server Computing
-
17
Authors:
Source: Security & Communication Networks; 7/25/2016, Vol. 9 Issue 11, p1477-1495, 19p
Subject Terms: JAVASCRIPT programming language, DATA extraction, HTML (Document markup language), WORLD Wide Web
Reviews & Products: GOOGLE Chrome (Computer software)
-
18
Authors:
Source: 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05); 2005, p85-94, 10p
-
19
Authors: et al.
Source: Journal of Information Security & Applications. May2021, Vol. 58, pN.PAG-N.PAG. 1p.
-
20
Authors: et al.
Source: Theory & Practice of Logic Programming; Jul2012, Vol. 12 Issue 4/5, p755-773, 19p
Nájsť tento článok vo Web of Science
Full Text Finder