Search Results - "JavaScript code"

Refine Results
  1. 1

    An Investigation of confusing code patterns in JavaScript by Torres, Adriano, Oliveira, Caio, Okimoto, Márcio, Marcílio, Diego, Queiroga, Pedro, Castor, Fernando, Bonifácio, Rodrigo, Canedo, Edna Dias, Ribeiro, Márcio, Monteiro, Eduardo

    ISSN: 0164-1212, 1873-1228
    Published: Elsevier Inc 01.09.2023
    Published in The Journal of systems and software (01.09.2023)
    “…Evolving software is particularly challenging when the code has been poorly written or uses confusing idioms and language constructs, which might increase…”
    Get full text
    Journal Article
  2. 2

    Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art by Gupta, Shashank, Gupta, B. B.

    ISSN: 0975-6809, 0976-4348
    Published: New Delhi Springer India 01.01.2017
    “…Nowadays, web applications are becoming one of the standard platforms for representing data and service releases over the World Wide Web. Since web…”
    Get full text
    Journal Article
  3. 3

    Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network by Gupta, Shashank, Gupta, B.B., Chaudhary, Pooja

    ISSN: 0167-739X, 1872-7115
    Published: Elsevier B.V 01.02.2018
    Published in Future generation computer systems (01.02.2018)
    “…This article presents a runtime Document Object Model (DOM) tree generator and nested context-aware sanitization based framework that alleviates the DOM-based…”
    Get full text
    Journal Article
  4. 4

    XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud by Gupta, Shashank, Gupta, B. B.

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.02.2018
    Published in Multimedia tools and applications (01.02.2018)
    “…This article presents a novel framework XSS-Secure, which detects and alleviates the propagation of Cross-Site Scripting (XSS) worms from the Online Social…”
    Get full text
    Journal Article
  5. 5

    A client‐server JavaScript code rewriting‐based framework to detect the XSS worms from online social network by Gupta, Shashank, Gupta, B.B., Chaudhary, Pooja

    ISSN: 1532-0626, 1532-0634
    Published: Hoboken Wiley Subscription Services, Inc 10.11.2019
    Published in Concurrency and computation (10.11.2019)
    “…Summary This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS…”
    Get full text
    Journal Article
  6. 6

    Critical flow in open channels: Numerical solution using the Newton-Raphson method for Android 4.0 applica-tion by Ladino Moreno, Édgar Orlando, García-Ubaque, César Augusto, García Vaca, María Camila

    ISSN: 0123-921X, 2248-7638
    Published: Universidad Distrital Francisco Jose de Caldas 01.01.2020
    Published in Tecnura (01.01.2020)
    “…Context: In this article we present an algorithm under JavaScript source code for critical flow equation solution. Method: An object-oriented programming…”
    Get full text
    Journal Article
  7. 7

    CSSXC: Context-sensitive Sanitization Framework for Web Applications against XSS Vulnerabilities in Cloud Environments by Gupta, Shashank, Gupta, B.B.

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2016
    Published in Procedia computer science (2016)
    “…This paper presents a context-sensitive sanitization based XSS defensive framework for the cloud environment. It discovers all the hidden injection points in…”
    Get full text
    Journal Article
  8. 8

    Darcy-Weisbach resistance coefficient determination using Newton-Raphson approach for android 4.0 by Ladino Moreno, Edgar Orlando, García Ubaque, César Augusto, García Vaca, María Camila

    ISSN: 0123-921X, 2248-7638
    Published: Universidad Distrital Francisco José de Caldas 01.04.2019
    Published in Tecnura (01.04.2019)
    “…Context: The article presents the friction coefficient calculation for pressure pipes, from Newton-Raphson numerical method, under JavaScript source code for…”
    Get full text
    Journal Article
  9. 9

    Systematic adaptation of dynamically generated source code via domain-specific examples by Song, Myoungkyu, Tilevich, Eli

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Published: The Institution of Engineering and Technology 01.04.2018
    Published in IET software (01.04.2018)
    “…In modern web-based applications, an increasing amount of source code is generated dynamically at runtime. Web applications commonly execute dynamically…”
    Get full text
    Journal Article
  10. 10

    Detection Approach of Malicious JavaScript Code Based on deep learning by Zheng, Liyuan, Zhang, Dongcheng, Xie, Xin, Wang, Chen, Hou, Boyuan

    Published: IEEE 26.05.2023
    “…Traditional machine learning methods for detecting JavaScript malicious code have the problems of complex feature extraction process, extensive computation,…”
    Get full text
    Conference Proceeding
  11. 11

    Mining Rule Violations in JavaScript Code Snippets by Ferreira Campos, Uriel, Smethurst, Guilherme, Moraes, Joao Pedro, Bonifacio, Rodrigo, Pinto, Gustavo

    ISSN: 2574-3864
    Published: IEEE 01.05.2019
    “…Programming code snippets readily available on platforms such as StackOverflow are undoubtedly useful for software engineers. Unfortunately, these code…”
    Get full text
    Conference Proceeding
  12. 12

    A comparative analysis of Cross Site Scripting (XSS) detecting and defensive techniques by Mahmoud, Shaimaa Khalifa, Alfonse, Marco, Roushdy, Mohamed Ismail, Salem, Abdel-Badeeh M.

    Published: IEEE 01.12.2017
    “…Now the web applications are highly useful and powerful for usage in most fields such as finance, e-commerce, healthcare and more, so it must be well secured…”
    Get full text
    Conference Proceeding
  13. 13

    SFC: A Three Layer Smart Phone-Fag-Cloud Framework for Defending Against JavaScript Code Injection Vulnerabilities on OSN by Gupta, Shashank, Gugta, B. B.

    Published: IEEE 01.01.2018
    “…This article introduced a Fog centric model in the proximity of smart phone devices and virtual Cloud Data Centers (CDC) that senses and avoids an execution of…”
    Get full text
    Conference Proceeding
  14. 14

    JSObfusDetector: A binary PSO-based one-class classifier ensemble to detect obfuscated JavaScript code by Jodavi, Mehran, Abadi, Mahdi, Parhizkar, Elham

    Published: IEEE 01.03.2015
    “…JavaScript code obfuscation has become a major technique used by malware writers to evade static analysis techniques. Over the past years, a number of dynamic…”
    Get full text
    Conference Proceeding
  15. 15

    Injecting Comments to Detect JavaScript Code Injection Attacks by Shahriar, H., Zulkernine, M.

    ISBN: 9781457709807, 1457709805
    Published: IEEE 01.07.2011
    “…Most web programs are vulnerable to cross site scripting (XSS) that can be exploited by injecting JavaScript code. Unfortunately, injected JavaScript code is…”
    Get full text
    Conference Proceeding
  16. 16

    Best Practices by Frisbie, Matt

    ISBN: 1119366445, 9781119366447
    Published: United States John Wiley & Sons, Incorporated 2019
    “…Best practices for JavaScript fall into several categories and are handled at different points in the development process. Writing maintainable code is…”
    Get full text
    Book Chapter
  17. 17

    Error Handling and Debugging by Frisbie, Matt

    ISBN: 1119366445, 9781119366447
    Published: United States John Wiley & Sons, Incorporated 2019
    “…JavaScript has traditionally been known as one of the most difficult programming languages to debug because of its dynamic nature and years without proper…”
    Get full text
    Book Chapter
  18. 18

    Tooling Up

    ISBN: 1119028728, 9781119028727
    Published: Hoboken, NJ, USA John Wiley & Sons, Inc 02.04.2015
    Published in Reliable JavaScript (02.04.2015)
    “…TDD identifies defects in code at the earliest possible time. When following TDD, a test is written to verify a small piece of functionality, and then the…”
    Get full text
    Book Chapter
  19. 19

    PDF Malicious Indicators Extraction Technique Based on Improved Symbolic Execution by SONG Enzhou, HU Tao, YI Peng, WANG Wenbo

    ISSN: 1002-137X
    Published: Editorial office of Computer Science 01.07.2024
    Published in Ji suan ji ke xue (01.07.2024)
    “…The malicious PDF document is a common attack method used by APT organizations.Analyzing extracted indicators of embedded JavaScript code is an important means…”
    Get full text
    Journal Article
  20. 20