Výsledky vyhledávání - "Vulnerable JavaScript"
-
1
Vulnerable JavaScript functions detection using stacking of convolutional neural networks
ISSN: 2376-5992, 2376-5992Vydáno: United States PeerJ. Ltd 29.02.2024Vydáno v PeerJ. Computer science (29.02.2024)“…System security for web-based applications is paramount, and for the avoidance of possible cyberattacks it is important to detect vulnerable JavaScript functions…”
Získat plný text
Journal Article -
2
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
Vydáno: IEEE 01.05.2019Vydáno v 2019 IEEE/ACM 7th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE) (01.05.2019)“…The rapid rise of cyber-crime activities and the growing number of devices threatened by them place software security issues in the spotlight. As around 90% of…”
Získat plný text
Konferenční příspěvek -
3
On the Impact of Outdated and Vulnerable Javascript Packages in Docker Images
Vydáno: IEEE 01.02.2019Vydáno v 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER) (01.02.2019)“…Containerized applications, and in particular Docker images, are becoming a common solution in cloud environments to meet ever-increasing demands in terms of…”
Získat plný text
Konferenční příspěvek -
4
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions
ISSN: 2331-8422Vydáno: Ithaca Cornell University Library, arXiv.org 12.05.2024Vydáno v arXiv.org (12.05.2024)“…The rapid rise of cyber-crime activities and the growing number of devices threatened by them place software security issues in the spotlight. As around 90% of…”
Získat plný text
Paper -
5
Securing web-clients with instrumented code and dynamic runtime monitoring
ISSN: 0164-1212, 1873-1228Vydáno: New York Elsevier Inc 01.06.2013Vydáno v The Journal of systems and software (01.06.2013)“…► Highly robust proxy based framework that can intercept HTTP request/response. ► A comprehensive HTTP traffic transformation XML rules schema. ►…”
Získat plný text
Journal Article -
6
Security Vulnerabilities in Docker Images: A Cross-Tag Study of Application Dependencies
ISSN: 2576-3148Vydáno: IEEE 07.09.2025Vydáno v Proceedings - Conference on Software Maintenance (1987) (07.09.2025)“…Docker containers are widely used in modern enterprise applications and cloud environments for their efficiency, portability, and rapid deployment. As a…”
Získat plný text
Konferenční příspěvek -
7
Vulnerability Testing and Analysis Using OWASP Top 10 on Academic Information System at University XYZ
Vydáno: IEEE 11.12.2024Vydáno v 2024 International Conference of Adisutjipto on Aerospace Electrical Engineering and Informatics (ICAAEEI) (11.12.2024)“…In the evolving landscape of digital education, Academic Information Systems (AIS) have become essential for managing educational processes and facilitating…”
Získat plný text
Konferenční příspěvek -
8
A Study of Vulnerability Repair in JavaScript Programs with Large Language Models
ISSN: 2331-8422Vydáno: Ithaca Cornell University Library, arXiv.org 19.03.2024Vydáno v arXiv.org (19.03.2024)“… We also investigate the impact of context in a prompt on directing LLMs to produce a correct patch of vulnerable JavaScript code…”
Získat plný text
Paper -
9
Measuring the Prevalence and Security Implications of Abandoned Resources on the Internet
ISBN: 9780438726437, 043872643XVydáno: ProQuest Dissertations & Theses 01.01.2018“…Resources on the Internet are not guaranteed to be available or maintained in perpetuity. Rather, resources may start to be neglected, and eventually be…”
Získat plný text
Dissertation

