A client‐server JavaScript code rewriting‐based framework to detect the XSS worms from online social network
Summary This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS worms on Online Social Network (OSN). The server‐side generates an estimation graph which is explored for extracting the JavaScript code and shi...
Uloženo v:
| Vydáno v: | Concurrency and computation Ročník 31; číslo 21 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Hoboken
Wiley Subscription Services, Inc
10.11.2019
|
| Témata: | |
| ISSN: | 1532-0626, 1532-0634 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Summary
This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS worms on Online Social Network (OSN). The server‐side generates an estimation graph which is explored for extracting the JavaScript code and shifts such code in a separate file. This shifting is done for completely isolating the untrusted JavaScript code and data. The client‐side performs runtime monitoring of the dynamic JavaScript code to recognize the tainted flow of untrusted JavaScript variables. The context of such dynamic tainted variables is determined, for performing the string analysis to examine whether it may be considered as vulnerable point or not. Finally, decoding operation is performed on the obfuscated malicious JavaScript code and the JavaScript code embedded in the parameter values of HTTP request. If match is found, then XSS attack vector is present. Otherwise, it is not. The authors have developed their prototype on the Java development framework and have estimated the malicious script alleviation capability of this proposed work on tested web applications (Humhub, Elgg, WordPress, Joomla, Drupal). |
|---|---|
| AbstractList | This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS worms on Online Social Network (OSN). The server‐side generates an estimation graph which is explored for extracting the JavaScript code and shifts such code in a separate file. This shifting is done for completely isolating the untrusted JavaScript code and data. The client‐side performs runtime monitoring of the dynamic JavaScript code to recognize the tainted flow of untrusted JavaScript variables. The context of such dynamic tainted variables is determined, for performing the string analysis to examine whether it may be considered as vulnerable point or not. Finally, decoding operation is performed on the obfuscated malicious JavaScript code and the JavaScript code embedded in the parameter values of HTTP request. If match is found, then XSS attack vector is present. Otherwise, it is not. The authors have developed their prototype on the Java development framework and have estimated the malicious script alleviation capability of this proposed work on tested web applications (Humhub, Elgg, WordPress, Joomla, Drupal). Summary This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS worms on Online Social Network (OSN). The server‐side generates an estimation graph which is explored for extracting the JavaScript code and shifts such code in a separate file. This shifting is done for completely isolating the untrusted JavaScript code and data. The client‐side performs runtime monitoring of the dynamic JavaScript code to recognize the tainted flow of untrusted JavaScript variables. The context of such dynamic tainted variables is determined, for performing the string analysis to examine whether it may be considered as vulnerable point or not. Finally, decoding operation is performed on the obfuscated malicious JavaScript code and the JavaScript code embedded in the parameter values of HTTP request. If match is found, then XSS attack vector is present. Otherwise, it is not. The authors have developed their prototype on the Java development framework and have estimated the malicious script alleviation capability of this proposed work on tested web applications (Humhub, Elgg, WordPress, Joomla, Drupal). |
| Author | Gupta, B.B. Chaudhary, Pooja Gupta, Shashank |
| Author_xml | – sequence: 1 givenname: Shashank orcidid: 0000-0002-2124-9388 surname: Gupta fullname: Gupta, Shashank organization: Birla Institute of Technology and Science Pilani – sequence: 2 givenname: B.B. orcidid: 0000-0003-4929-4698 surname: Gupta fullname: Gupta, B.B. email: gupta.brij@gmail.com organization: National Institute of Technology Kurukshetra – sequence: 3 givenname: Pooja surname: Chaudhary fullname: Chaudhary, Pooja organization: National Institute of Technology Kurukshetra |
| BookMark | eNp1kMtKAzEUhoMo2FbBRwi4cTM1l5l0uiyl3igoVMFdyGTOaOo0GZO0pTsfwWf0SZxacSG6OofD9_8Hvi7at84CQieU9Ckh7Fw30E9FKvZQh2acJUTwdP9nZ-IQdUOYE0Ip4bSDmhHWtQEbP97eA_gVeHyjVmqmvWki1q4E7GHtTTT2qUUKFaDElVcLWDv_gqPDJUTQEcdnwI-zGW7Pi9ASboGdrY0FHJw2qsYW4jZyhA4qVQc4_p499HAxuR9fJdPby-vxaJpoNuQiAUoUpAMQWVURnvOsyipWUlXRnEJeDCkBUJwPmSIl1TkRxSBjORc842mRM8176HTX23j3uoQQ5dwtvW1fSsZJOiCMibylznaU9i4ED5VsvFkov5GUyK1P2fqUW58t2v-FahNVNM5Gr0z9VyDZBdamhs2_xXJ8N_niPwGHeop7 |
| CitedBy_id | crossref_primary_10_1007_s12243_024_01022_8 crossref_primary_10_1007_s12652_018_1118_3 crossref_primary_10_1002_cpe_5278 crossref_primary_10_1002_cpe_6505 crossref_primary_10_1016_j_cosrev_2024_100634 |
| Cites_doi | 10.1007/s13369-015-1891-7 10.1007/s11042-016-3735-1 10.1145/1772690.1772701 10.1145/2742854.2745719 10.1109/MALWARE.2009.5403020 10.1109/ICT4M.2014.7020628 10.1145/2414456.2414462 10.1145/2414456.2414458 10.1016/j.future.2017.05.038 10.1109/TASE.2011.43 10.1145/2480359.2429115 10.1109/TCYB.2016.2539546 10.1080/15536548.2015.1044865 10.1002/sec.1433 10.1007/s13198-015-0376-0 10.1016/j.jnca.2018.01.003 10.1109/TKDE.2017.2728531 10.1109/ACCESS.2018.2802928 10.1145/2660859.2660969 10.1109/JSTSP.2016.2607692 10.1007/978-3-540-27813-9_25 10.1109/TIP.2017.2708506 10.1007/978-3-319-46298-1_7 10.1109/TPAMI.2016.2608901 10.1109/ISCC.2012.6249380 10.4018/IJCAC.2017010101 10.1145/2046707.2046775 |
| ContentType | Journal Article |
| Copyright | 2018 John Wiley & Sons, Ltd. 2019 John Wiley & Sons, Ltd. |
| Copyright_xml | – notice: 2018 John Wiley & Sons, Ltd. – notice: 2019 John Wiley & Sons, Ltd. |
| DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
| DOI | 10.1002/cpe.4646 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | CrossRef Computer and Information Systems Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1532-0634 |
| EndPage | n/a |
| ExternalDocumentID | 10_1002_cpe_4646 CPE4646 |
| Genre | article |
| GroupedDBID | .3N .DC .GA 05W 0R~ 10A 1L6 1OC 33P 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHHS AAHQN AAMNL AANLZ AAONW AASGY AAXRX AAYCA AAZKR ABCQN ABCUV ABEML ABIJN ACAHQ ACCFJ ACCZN ACPOU ACSCC ACXBN ACXQS ADBBV ADEOM ADIZJ ADKYN ADMGS ADOZA ADXAS ADZMN ADZOD AEEZP AEIGN AEIMD AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFWVQ AHBTC AITYG AIURR AIWBW AJBDE AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ATUGU AUFTA AZBYB BAFTC BDRZF BFHJK BHBCM BMNLL BROTX BRXPI BY8 CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM EBS EJD F00 F01 F04 F5P G-S G.N GNP GODZA HGLYW HHY HZ~ IX1 JPC KQQ LATKE LAW LC2 LC3 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LYRES MEWTI MK4 MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A O66 O9- OIG P2W P2X P4D PQQKQ Q.N Q11 QB0 QRW R.K ROL RWI RX1 SUPJJ TN5 UB1 V2E W8V W99 WBKPD WIH WIK WOHZO WQJ WRC WXSBR WYISQ WZISG XG1 XV2 ~IA ~WT AAYXX ADMLS AEYWJ AGHNM AGYGG CITATION O8X 7SC 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c2936-e10ae47e65ff03835f5f2d1af181e8b910eea3392a0d1c806b7528363534b82c3 |
| IEDL.DBID | DRFUL |
| ISICitedReferencesCount | 3 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000490534700019&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1532-0626 |
| IngestDate | Sun Nov 09 08:31:36 EST 2025 Sat Nov 29 01:41:19 EST 2025 Tue Nov 18 21:29:01 EST 2025 Wed Jan 22 16:38:23 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 21 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2936-e10ae47e65ff03835f5f2d1af181e8b910eea3392a0d1c806b7528363534b82c3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-2124-9388 0000-0003-4929-4698 |
| PQID | 2304702268 |
| PQPubID | 2045170 |
| PageCount | 1 |
| ParticipantIDs | proquest_journals_2304702268 crossref_primary_10_1002_cpe_4646 crossref_citationtrail_10_1002_cpe_4646 wiley_primary_10_1002_cpe_4646_CPE4646 |
| PublicationCentury | 2000 |
| PublicationDate | 10 November 2019 |
| PublicationDateYYYYMMDD | 2019-11-10 |
| PublicationDate_xml | – month: 11 year: 2019 text: 10 November 2019 day: 10 |
| PublicationDecade | 2010 |
| PublicationPlace | Hoboken |
| PublicationPlace_xml | – name: Hoboken |
| PublicationTitle | Concurrency and computation |
| PublicationYear | 2019 |
| Publisher | Wiley Subscription Services, Inc |
| Publisher_xml | – name: Wiley Subscription Services, Inc |
| References | 2017; 8 2013; 48 2012 2017; 26 2011 2017; 47 2010 2015; 11 2016; 10 2009 2008 2007 1996 2017; 29 2004 2016; 77 2018; 6 2017; 39 2015; 41 2018 2017 2016 2015 2014 2016; 9 2018; 79 e_1_2_5_27_1 e_1_2_5_25_1 e_1_2_5_48_1 e_1_2_5_26_1 e_1_2_5_47_1 e_1_2_5_23_1 e_1_2_5_46_1 e_1_2_5_24_1 e_1_2_5_45_1 Gupta S (e_1_2_5_10_1) 2014 e_1_2_5_21_1 Biehl M (e_1_2_5_30_1) 1996 e_1_2_5_44_1 e_1_2_5_22_1 e_1_2_5_43_1 e_1_2_5_29_1 e_1_2_5_42_1 e_1_2_5_20_1 Li J (e_1_2_5_28_1) e_1_2_5_41_1 e_1_2_5_40_1 e_1_2_5_15_1 e_1_2_5_38_1 e_1_2_5_14_1 e_1_2_5_39_1 e_1_2_5_17_1 e_1_2_5_36_1 e_1_2_5_9_1 e_1_2_5_16_1 e_1_2_5_37_1 e_1_2_5_8_1 e_1_2_5_11_1 e_1_2_5_34_1 e_1_2_5_7_1 e_1_2_5_35_1 e_1_2_5_6_1 e_1_2_5_13_1 e_1_2_5_32_1 e_1_2_5_5_1 e_1_2_5_12_1 e_1_2_5_33_1 e_1_2_5_4_1 e_1_2_5_3_1 e_1_2_5_2_1 e_1_2_5_19_1 e_1_2_5_18_1 e_1_2_5_31_1 |
| References_xml | – year: 2011 – year: 2009 – start-page: 6 year: 1996 end-page: 25 – start-page: 216 year: 2017 – volume: 26 start-page: 3911 issue: 8 year: 2017 end-page: 3920 article-title: Feature interaction augmented sparse learning for fast kinect motion detection publication-title: IEEE Trans Image Process – volume: 11 start-page: 118 issue: 2 year: 2015 end-page: 136 article-title: Cross‐site scripting (XSS) abuse and defense: exploitation on several testing bed environments and its defense publication-title: J Inf Priv Secur – volume: 6 start-page: 15816 year: 2018 end-page: 15822 article-title: A study on the collusion security of LUT‐based client‐side watermark embedding publication-title: IEEE Access – volume: 77 start-page: 4829 issue: 4 year: 2016 end-page: 4861 article-title: XSS‐secure as a service for the platforms of online social network‐based multimedia web applications in cloud publication-title: Multimed Tools Appl – year: 2007 – volume: 29 start-page: 2100 issue: 10 year: 2017 end-page: 2110 article-title: Beyond trace ratio: weighted harmonic mean of trace ratios for multiclass discriminant analysis publication-title: IEEE Trans Knowl Data Eng – start-page: 174 year: 2014 end-page: 191 – year: 2016 – year: 2014 – volume: 39 start-page: 1617 issue: 8 year: 2017 end-page: 1632 article-title: Semantic pooling for complex event analysis in untrimmed videos publication-title: IEEE Trans Pattern Anal Mach Intell – start-page: 321 year: 2004 end-page: 333 – year: 2010 – year: 2012 – volume: 8 start-page: 512 issue: 1 year: 2017 end-page: 530 article-title: Cross‐site scripting (XSS) attacks and defense mechanisms: classification and state‐of‐the‐art publication-title: Int J Syst Assur Eng Manag – volume: 47 start-page: 1180 issue: 5 year: 2017 end-page: 1197 article-title: Bi‐level semantic representation analysis for multimedia event detection publication-title: IEEE Trans Cybern – volume: 48 start-page: 385 issue: 1 year: 2013 end-page: 398 article-title: Towards fully automatic placement of security sanitizers and declassifiers publication-title: ACM SIGPLAN Notices – year: 2008 – volume: 9 start-page: 1477 issue: 11 year: 2016 end-page: 1495 article-title: JS‐SAN: defense mechanism for HTML5‐based web applications against javascript code injection vulnerabilities publication-title: Secur Commun Netw – volume: 41 start-page: 897 issue: 3 year: 2015 end-page: 920 article-title: XSS‐SAFE: a server‐side approach to detect and mitigate cross‐site scripting (XSS) attacks in javascript code publication-title: Arab J Sci Eng – year: 2018 article-title: Cloud‐aided lightweight certificateless authentication protocol with anonymity for wireless body area networks publication-title: J Netw Comput Appl – volume: 79 start-page: 319 year: 2018 end-page: 336 article-title: Hunting for DOM‐based XSS vulnerabilities in mobile cloud‐based online social network publication-title: Futur Gener Comput Syst – volume: 10 start-page: 1494 issue: 8 year: 2016 end-page: 1505 article-title: Secure multiple amplify‐and‐forward relaying with cochannel interference publication-title: IEEE J Sel Top Signal Process – article-title: Significant permission identification for machine learning based Android malware detection publication-title: IEEE Trans Ind Inform – year: 2017 – year: 2015 – ident: e_1_2_5_4_1 doi: 10.1007/s13369-015-1891-7 – ident: e_1_2_5_24_1 doi: 10.1007/s11042-016-3735-1 – ident: e_1_2_5_47_1 doi: 10.1145/1772690.1772701 – ident: e_1_2_5_15_1 – ident: e_1_2_5_40_1 – ident: e_1_2_5_5_1 doi: 10.1145/2742854.2745719 – ident: e_1_2_5_16_1 doi: 10.1109/MALWARE.2009.5403020 – ident: e_1_2_5_37_1 – ident: e_1_2_5_34_1 doi: 10.1109/ICT4M.2014.7020628 – ident: e_1_2_5_42_1 – ident: e_1_2_5_20_1 doi: 10.1145/2414456.2414462 – ident: e_1_2_5_26_1 – ident: e_1_2_5_17_1 – ident: e_1_2_5_48_1 doi: 10.1145/2414456.2414458 – ident: e_1_2_5_13_1 doi: 10.1016/j.future.2017.05.038 – ident: e_1_2_5_45_1 – ident: e_1_2_5_18_1 doi: 10.1109/TASE.2011.43 – ident: e_1_2_5_22_1 doi: 10.1145/2480359.2429115 – ident: e_1_2_5_14_1 – ident: e_1_2_5_33_1 doi: 10.1109/TCYB.2016.2539546 – ident: e_1_2_5_9_1 doi: 10.1080/15536548.2015.1044865 – ident: e_1_2_5_3_1 doi: 10.1002/sec.1433 – start-page: 174 volume-title: Handbook of Research on Securing Cloud‐Based Databases with Biometric Applications year: 2014 ident: e_1_2_5_10_1 – ident: e_1_2_5_11_1 doi: 10.1007/s13198-015-0376-0 – ident: e_1_2_5_36_1 – ident: e_1_2_5_41_1 – ident: e_1_2_5_44_1 – ident: e_1_2_5_6_1 doi: 10.1016/j.jnca.2018.01.003 – ident: e_1_2_5_39_1 – ident: e_1_2_5_2_1 doi: 10.1109/TKDE.2017.2728531 – ident: e_1_2_5_38_1 – ident: e_1_2_5_7_1 doi: 10.1109/ACCESS.2018.2802928 – ident: e_1_2_5_19_1 doi: 10.1145/2660859.2660969 – ident: e_1_2_5_35_1 – ident: e_1_2_5_8_1 doi: 10.1109/JSTSP.2016.2607692 – ident: e_1_2_5_28_1 article-title: Significant permission identification for machine learning based Android malware detection publication-title: IEEE Trans Ind Inform – ident: e_1_2_5_31_1 doi: 10.1007/978-3-540-27813-9_25 – ident: e_1_2_5_32_1 doi: 10.1109/TIP.2017.2708506 – ident: e_1_2_5_25_1 doi: 10.1007/978-3-319-46298-1_7 – ident: e_1_2_5_29_1 doi: 10.1109/TPAMI.2016.2608901 – ident: e_1_2_5_21_1 doi: 10.1109/ISCC.2012.6249380 – start-page: 6 volume-title: Automata Implementation year: 1996 ident: e_1_2_5_30_1 – ident: e_1_2_5_43_1 – ident: e_1_2_5_46_1 – ident: e_1_2_5_27_1 – ident: e_1_2_5_12_1 doi: 10.4018/IJCAC.2017010101 – ident: e_1_2_5_23_1 doi: 10.1145/2046707.2046775 |
| SSID | ssj0011031 |
| Score | 2.2645202 |
| Snippet | Summary
This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS... This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS worms on... |
| SourceID | proquest crossref wiley |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| SubjectTerms | Applications programs Computer worms Cross‐Site Scripting (XSS) worms Decoding Hypertext Java Online Social Networking (OSN) security RSS technology Social networks untrusted JavaScript code web security XSS filters |
| Title | A client‐server JavaScript code rewriting‐based framework to detect the XSS worms from online social network |
| URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fcpe.4646 https://www.proquest.com/docview/2304702268 |
| Volume | 31 |
| WOSCitedRecordID | wos000490534700019&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVWIB databaseName: Wiley Online Library Full Collection 2020 customDbUrl: eissn: 1532-0634 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0011031 issn: 1532-0626 databaseCode: DRFUL dateStart: 20010101 isFulltext: true titleUrlDefault: https://onlinelibrary.wiley.com providerName: Wiley-Blackwell |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1fS8MwED90-uCL8y9Op0QQfapL2zTtHsfcEBljOAd7K02aiDC7sc356kfwM_pJvPTPpqAg-FRoLyUkudzvkrvfAVxoP9bodikLTVNgMVbHfdAX3IoV5XXbEYFQaaJwx-92g-Gw3sujKk0uTMYPsTxwM5qR7tdGwSMxq61IQ-VEXTPO-DpsOLhsWQk2bu7bg87yDsEUMMjYUh2LIm4vqGepUyvafjdGK4T5FaemhqZd_k8Xd2A7h5ekka2HXVhTyR6Ui9INJNfkfZg0iByZVMiPt3dzLovf7qJF1E_3EGLy3MlUvRrCo-QRRYyti4kuArnIfExiZa4fCOJHMuz3Cb5-nhGTrEKynpPsNJ4kWZz5AQzarYfmrZUXX7AkIgBuKZtGivmKe1pTdGM97WkntiONkEAFAlGGUpGL6CqisS0DyoVveGIQv7hMBI50D6GUjBN1BIQKzxbouDFPuvhHdJGYZK7UgvpOILlfgatiFkKZM5ObAhmjMONUdkIcyNAMZAXOl5KTjI3jB5lqMZFhro-zML1dRLjCgwpcplP2a_uw2WuZ5_FfBU9gC1FU3UpjA6tQmk9f1ClsysX8aTY9y1flJyU15-A |
| linkProvider | Wiley-Blackwell |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwED90Cvri_MTp1AiiT9W0TdMOn8Z0-DHHcBP2Vpo0EUHr2Ka--if4N_qXeOnHVFAQfCq0lxKSXO53l9zvAPa0H2t0u5SFpimwGKvhPugLbsWK8prtiECoNFG45bfbQb9f60zBcZELk_FDTAJuRjPS_doouAlIH32yhsqBOmSc8WmYYbiKvBLMnFw3b1qTQwRTwSCjS3UsisC94J6lzlHR9rs1-oSYX4Fqamma5X_1cREWcoBJ6tmKWIIplSxDuSjeQHJdXoFBnch7kwz5_vpmIrP47SJ6jrrpLkJMpjsZqhdDeZTcooixdjHRxVUuMn4ksTIHEAQRJOl3uwRfP4yISVchWddJFo8nSXbTfBVumqe9xpmVl1-wJGIAbimbRor5intaU3RkPe1pJ7YjjaBABQJxhlKRi_gqorEtA8qFb5hiEMG4TASOdNeglDwmah0IFZ4t0HVjnnTxj-gkMclcqQX1nUByvwIHxTSEMucmNyUy7sOMVdkJcSBDM5AV2J1IDjI-jh9kqsVMhrlGjsL0fBEBCw8qsJ_O2a_tw0bn1Dw3_iq4A3NnvatW2DpvX27CPGKqmpXeFKxCaTx8UlswK5_Hd6Phdr5EPwACqevQ |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFD7MC-KL84rTqRFEn-rSNk1bfBLn8DLGcAp7K02aiKB1bFNf_Qn-Rn-JJ71MBQXBp0J7UkKSk_OdnJzvAOxpP9HodikLTVNgMRbiPugLbiWK8tB2RCBUlijc9judoN8PuxU4KnNhcn6IyYGb0YxsvzYKrgaJbnyyhsqBOmSc8SmYYV7IUStnmletm_YkiGAqGOR0qY5FEbiX3LPUaZRtv1ujT4j5FahmlqZV_VcfF2GhAJjkOF8RS1BR6TJUy-INpNDlFRgcE3lvkiHfX9_MySx-u4if4162ixCT6U6G6sVQHqW3KGKsXUJ0eZWLjB9JokwAgiCCJP1ej-DrhxEx6Sok7zrJz-NJmt80X4Wb1un1yZlVlF-wJGIAbimbxor5intaU3RkPe1pJ7FjjaBABQJxhlKxi_gqpoktA8qFb5hiEMG4TASOdNdgOn1M1ToQKjxboOvGPOniH9FJYpK5UgvqO4Hkfg0OymmIZMFNbkpk3Ec5q7IT4UBGZiBrsDuRHOR8HD_I1MuZjAqNHEVZfBEBCw9qsJ_N2a_to5PuqXlu_FVwB-a6zVbUPu9cbsI8QqrQyi4K1mF6PHxSWzArn8d3o-F2sUI_AKx760s |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+client%E2%80%90server+JavaScript+code+rewriting%E2%80%90based+framework+to+detect+the+XSS+worms+from+online+social+network&rft.jtitle=Concurrency+and+computation&rft.au=Gupta%2C+Shashank&rft.au=Gupta%2C+B.B.&rft.au=Chaudhary%2C+Pooja&rft.date=2019-11-10&rft.issn=1532-0626&rft.eissn=1532-0634&rft.volume=31&rft.issue=21&rft_id=info:doi/10.1002%2Fcpe.4646&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_cpe_4646 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1532-0626&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1532-0626&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1532-0626&client=summon |