A client‐server JavaScript code rewriting‐based framework to detect the XSS worms from online social network

Summary This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS worms on Online Social Network (OSN). The server‐side generates an estimation graph which is explored for extracting the JavaScript code and shi...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Concurrency and computation Ročník 31; číslo 21
Hlavní autoři: Gupta, Shashank, Gupta, B.B., Chaudhary, Pooja
Médium: Journal Article
Jazyk:angličtina
Vydáno: Hoboken Wiley Subscription Services, Inc 10.11.2019
Témata:
ISSN:1532-0626, 1532-0634
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Summary This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS worms on Online Social Network (OSN). The server‐side generates an estimation graph which is explored for extracting the JavaScript code and shifts such code in a separate file. This shifting is done for completely isolating the untrusted JavaScript code and data. The client‐side performs runtime monitoring of the dynamic JavaScript code to recognize the tainted flow of untrusted JavaScript variables. The context of such dynamic tainted variables is determined, for performing the string analysis to examine whether it may be considered as vulnerable point or not. Finally, decoding operation is performed on the obfuscated malicious JavaScript code and the JavaScript code embedded in the parameter values of HTTP request. If match is found, then XSS attack vector is present. Otherwise, it is not. The authors have developed their prototype on the Java development framework and have estimated the malicious script alleviation capability of this proposed work on tested web applications (Humhub, Elgg, WordPress, Joomla, Drupal).
AbstractList This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS worms on Online Social Network (OSN). The server‐side generates an estimation graph which is explored for extracting the JavaScript code and shifts such code in a separate file. This shifting is done for completely isolating the untrusted JavaScript code and data. The client‐side performs runtime monitoring of the dynamic JavaScript code to recognize the tainted flow of untrusted JavaScript variables. The context of such dynamic tainted variables is determined, for performing the string analysis to examine whether it may be considered as vulnerable point or not. Finally, decoding operation is performed on the obfuscated malicious JavaScript code and the JavaScript code embedded in the parameter values of HTTP request. If match is found, then XSS attack vector is present. Otherwise, it is not. The authors have developed their prototype on the Java development framework and have estimated the malicious script alleviation capability of this proposed work on tested web applications (Humhub, Elgg, WordPress, Joomla, Drupal).
Summary This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS worms on Online Social Network (OSN). The server‐side generates an estimation graph which is explored for extracting the JavaScript code and shifts such code in a separate file. This shifting is done for completely isolating the untrusted JavaScript code and data. The client‐side performs runtime monitoring of the dynamic JavaScript code to recognize the tainted flow of untrusted JavaScript variables. The context of such dynamic tainted variables is determined, for performing the string analysis to examine whether it may be considered as vulnerable point or not. Finally, decoding operation is performed on the obfuscated malicious JavaScript code and the JavaScript code embedded in the parameter values of HTTP request. If match is found, then XSS attack vector is present. Otherwise, it is not. The authors have developed their prototype on the Java development framework and have estimated the malicious script alleviation capability of this proposed work on tested web applications (Humhub, Elgg, WordPress, Joomla, Drupal).
Author Gupta, B.B.
Chaudhary, Pooja
Gupta, Shashank
Author_xml – sequence: 1
  givenname: Shashank
  orcidid: 0000-0002-2124-9388
  surname: Gupta
  fullname: Gupta, Shashank
  organization: Birla Institute of Technology and Science Pilani
– sequence: 2
  givenname: B.B.
  orcidid: 0000-0003-4929-4698
  surname: Gupta
  fullname: Gupta, B.B.
  email: gupta.brij@gmail.com
  organization: National Institute of Technology Kurukshetra
– sequence: 3
  givenname: Pooja
  surname: Chaudhary
  fullname: Chaudhary, Pooja
  organization: National Institute of Technology Kurukshetra
BookMark eNp1kMtKAzEUhoMo2FbBRwi4cTM1l5l0uiyl3igoVMFdyGTOaOo0GZO0pTsfwWf0SZxacSG6OofD9_8Hvi7at84CQieU9Ckh7Fw30E9FKvZQh2acJUTwdP9nZ-IQdUOYE0Ip4bSDmhHWtQEbP97eA_gVeHyjVmqmvWki1q4E7GHtTTT2qUUKFaDElVcLWDv_gqPDJUTQEcdnwI-zGW7Pi9ASboGdrY0FHJw2qsYW4jZyhA4qVQc4_p499HAxuR9fJdPby-vxaJpoNuQiAUoUpAMQWVURnvOsyipWUlXRnEJeDCkBUJwPmSIl1TkRxSBjORc842mRM8176HTX23j3uoQQ5dwtvW1fSsZJOiCMibylznaU9i4ED5VsvFkov5GUyK1P2fqUW58t2v-FahNVNM5Gr0z9VyDZBdamhs2_xXJ8N_niPwGHeop7
CitedBy_id crossref_primary_10_1007_s12243_024_01022_8
crossref_primary_10_1007_s12652_018_1118_3
crossref_primary_10_1002_cpe_5278
crossref_primary_10_1002_cpe_6505
crossref_primary_10_1016_j_cosrev_2024_100634
Cites_doi 10.1007/s13369-015-1891-7
10.1007/s11042-016-3735-1
10.1145/1772690.1772701
10.1145/2742854.2745719
10.1109/MALWARE.2009.5403020
10.1109/ICT4M.2014.7020628
10.1145/2414456.2414462
10.1145/2414456.2414458
10.1016/j.future.2017.05.038
10.1109/TASE.2011.43
10.1145/2480359.2429115
10.1109/TCYB.2016.2539546
10.1080/15536548.2015.1044865
10.1002/sec.1433
10.1007/s13198-015-0376-0
10.1016/j.jnca.2018.01.003
10.1109/TKDE.2017.2728531
10.1109/ACCESS.2018.2802928
10.1145/2660859.2660969
10.1109/JSTSP.2016.2607692
10.1007/978-3-540-27813-9_25
10.1109/TIP.2017.2708506
10.1007/978-3-319-46298-1_7
10.1109/TPAMI.2016.2608901
10.1109/ISCC.2012.6249380
10.4018/IJCAC.2017010101
10.1145/2046707.2046775
ContentType Journal Article
Copyright 2018 John Wiley & Sons, Ltd.
2019 John Wiley & Sons, Ltd.
Copyright_xml – notice: 2018 John Wiley & Sons, Ltd.
– notice: 2019 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/cpe.4646
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef

Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1532-0634
EndPage n/a
ExternalDocumentID 10_1002_cpe_4646
CPE4646
Genre article
GroupedDBID .3N
.DC
.GA
05W
0R~
10A
1L6
1OC
33P
3SF
3WU
4.4
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AAHQN
AAMNL
AANLZ
AAONW
AASGY
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABEML
ABIJN
ACAHQ
ACCFJ
ACCZN
ACPOU
ACSCC
ACXBN
ACXQS
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADOZA
ADXAS
ADZMN
ADZOD
AEEZP
AEIGN
AEIMD
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ATUGU
AUFTA
AZBYB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BROTX
BRXPI
BY8
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
EBS
EJD
F00
F01
F04
F5P
G-S
G.N
GNP
GODZA
HGLYW
HHY
HZ~
IX1
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LYRES
MEWTI
MK4
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
O66
O9-
OIG
P2W
P2X
P4D
PQQKQ
Q.N
Q11
QB0
QRW
R.K
ROL
RWI
RX1
SUPJJ
TN5
UB1
V2E
W8V
W99
WBKPD
WIH
WIK
WOHZO
WQJ
WRC
WXSBR
WYISQ
WZISG
XG1
XV2
~IA
~WT
AAYXX
ADMLS
AEYWJ
AGHNM
AGYGG
CITATION
O8X
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c2936-e10ae47e65ff03835f5f2d1af181e8b910eea3392a0d1c806b7528363534b82c3
IEDL.DBID DRFUL
ISICitedReferencesCount 3
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000490534700019&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1532-0626
IngestDate Sun Nov 09 08:31:36 EST 2025
Sat Nov 29 01:41:19 EST 2025
Tue Nov 18 21:29:01 EST 2025
Wed Jan 22 16:38:23 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 21
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2936-e10ae47e65ff03835f5f2d1af181e8b910eea3392a0d1c806b7528363534b82c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-2124-9388
0000-0003-4929-4698
PQID 2304702268
PQPubID 2045170
PageCount 1
ParticipantIDs proquest_journals_2304702268
crossref_primary_10_1002_cpe_4646
crossref_citationtrail_10_1002_cpe_4646
wiley_primary_10_1002_cpe_4646_CPE4646
PublicationCentury 2000
PublicationDate 10 November 2019
PublicationDateYYYYMMDD 2019-11-10
PublicationDate_xml – month: 11
  year: 2019
  text: 10 November 2019
  day: 10
PublicationDecade 2010
PublicationPlace Hoboken
PublicationPlace_xml – name: Hoboken
PublicationTitle Concurrency and computation
PublicationYear 2019
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2017; 8
2013; 48
2012
2017; 26
2011
2017; 47
2010
2015; 11
2016; 10
2009
2008
2007
1996
2017; 29
2004
2016; 77
2018; 6
2017; 39
2015; 41
2018
2017
2016
2015
2014
2016; 9
2018; 79
e_1_2_5_27_1
e_1_2_5_25_1
e_1_2_5_48_1
e_1_2_5_26_1
e_1_2_5_47_1
e_1_2_5_23_1
e_1_2_5_46_1
e_1_2_5_24_1
e_1_2_5_45_1
Gupta S (e_1_2_5_10_1) 2014
e_1_2_5_21_1
Biehl M (e_1_2_5_30_1) 1996
e_1_2_5_44_1
e_1_2_5_22_1
e_1_2_5_43_1
e_1_2_5_29_1
e_1_2_5_42_1
e_1_2_5_20_1
Li J (e_1_2_5_28_1)
e_1_2_5_41_1
e_1_2_5_40_1
e_1_2_5_15_1
e_1_2_5_38_1
e_1_2_5_14_1
e_1_2_5_39_1
e_1_2_5_17_1
e_1_2_5_36_1
e_1_2_5_9_1
e_1_2_5_16_1
e_1_2_5_37_1
e_1_2_5_8_1
e_1_2_5_11_1
e_1_2_5_34_1
e_1_2_5_7_1
e_1_2_5_35_1
e_1_2_5_6_1
e_1_2_5_13_1
e_1_2_5_32_1
e_1_2_5_5_1
e_1_2_5_12_1
e_1_2_5_33_1
e_1_2_5_4_1
e_1_2_5_3_1
e_1_2_5_2_1
e_1_2_5_19_1
e_1_2_5_18_1
e_1_2_5_31_1
References_xml – year: 2011
– year: 2009
– start-page: 6
  year: 1996
  end-page: 25
– start-page: 216
  year: 2017
– volume: 26
  start-page: 3911
  issue: 8
  year: 2017
  end-page: 3920
  article-title: Feature interaction augmented sparse learning for fast kinect motion detection
  publication-title: IEEE Trans Image Process
– volume: 11
  start-page: 118
  issue: 2
  year: 2015
  end-page: 136
  article-title: Cross‐site scripting (XSS) abuse and defense: exploitation on several testing bed environments and its defense
  publication-title: J Inf Priv Secur
– volume: 6
  start-page: 15816
  year: 2018
  end-page: 15822
  article-title: A study on the collusion security of LUT‐based client‐side watermark embedding
  publication-title: IEEE Access
– volume: 77
  start-page: 4829
  issue: 4
  year: 2016
  end-page: 4861
  article-title: XSS‐secure as a service for the platforms of online social network‐based multimedia web applications in cloud
  publication-title: Multimed Tools Appl
– year: 2007
– volume: 29
  start-page: 2100
  issue: 10
  year: 2017
  end-page: 2110
  article-title: Beyond trace ratio: weighted harmonic mean of trace ratios for multiclass discriminant analysis
  publication-title: IEEE Trans Knowl Data Eng
– start-page: 174
  year: 2014
  end-page: 191
– year: 2016
– year: 2014
– volume: 39
  start-page: 1617
  issue: 8
  year: 2017
  end-page: 1632
  article-title: Semantic pooling for complex event analysis in untrimmed videos
  publication-title: IEEE Trans Pattern Anal Mach Intell
– start-page: 321
  year: 2004
  end-page: 333
– year: 2010
– year: 2012
– volume: 8
  start-page: 512
  issue: 1
  year: 2017
  end-page: 530
  article-title: Cross‐site scripting (XSS) attacks and defense mechanisms: classification and state‐of‐the‐art
  publication-title: Int J Syst Assur Eng Manag
– volume: 47
  start-page: 1180
  issue: 5
  year: 2017
  end-page: 1197
  article-title: Bi‐level semantic representation analysis for multimedia event detection
  publication-title: IEEE Trans Cybern
– volume: 48
  start-page: 385
  issue: 1
  year: 2013
  end-page: 398
  article-title: Towards fully automatic placement of security sanitizers and declassifiers
  publication-title: ACM SIGPLAN Notices
– year: 2008
– volume: 9
  start-page: 1477
  issue: 11
  year: 2016
  end-page: 1495
  article-title: JS‐SAN: defense mechanism for HTML5‐based web applications against javascript code injection vulnerabilities
  publication-title: Secur Commun Netw
– volume: 41
  start-page: 897
  issue: 3
  year: 2015
  end-page: 920
  article-title: XSS‐SAFE: a server‐side approach to detect and mitigate cross‐site scripting (XSS) attacks in javascript code
  publication-title: Arab J Sci Eng
– year: 2018
  article-title: Cloud‐aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
  publication-title: J Netw Comput Appl
– volume: 79
  start-page: 319
  year: 2018
  end-page: 336
  article-title: Hunting for DOM‐based XSS vulnerabilities in mobile cloud‐based online social network
  publication-title: Futur Gener Comput Syst
– volume: 10
  start-page: 1494
  issue: 8
  year: 2016
  end-page: 1505
  article-title: Secure multiple amplify‐and‐forward relaying with cochannel interference
  publication-title: IEEE J Sel Top Signal Process
– article-title: Significant permission identification for machine learning based Android malware detection
  publication-title: IEEE Trans Ind Inform
– year: 2017
– year: 2015
– ident: e_1_2_5_4_1
  doi: 10.1007/s13369-015-1891-7
– ident: e_1_2_5_24_1
  doi: 10.1007/s11042-016-3735-1
– ident: e_1_2_5_47_1
  doi: 10.1145/1772690.1772701
– ident: e_1_2_5_15_1
– ident: e_1_2_5_40_1
– ident: e_1_2_5_5_1
  doi: 10.1145/2742854.2745719
– ident: e_1_2_5_16_1
  doi: 10.1109/MALWARE.2009.5403020
– ident: e_1_2_5_37_1
– ident: e_1_2_5_34_1
  doi: 10.1109/ICT4M.2014.7020628
– ident: e_1_2_5_42_1
– ident: e_1_2_5_20_1
  doi: 10.1145/2414456.2414462
– ident: e_1_2_5_26_1
– ident: e_1_2_5_17_1
– ident: e_1_2_5_48_1
  doi: 10.1145/2414456.2414458
– ident: e_1_2_5_13_1
  doi: 10.1016/j.future.2017.05.038
– ident: e_1_2_5_45_1
– ident: e_1_2_5_18_1
  doi: 10.1109/TASE.2011.43
– ident: e_1_2_5_22_1
  doi: 10.1145/2480359.2429115
– ident: e_1_2_5_14_1
– ident: e_1_2_5_33_1
  doi: 10.1109/TCYB.2016.2539546
– ident: e_1_2_5_9_1
  doi: 10.1080/15536548.2015.1044865
– ident: e_1_2_5_3_1
  doi: 10.1002/sec.1433
– start-page: 174
  volume-title: Handbook of Research on Securing Cloud‐Based Databases with Biometric Applications
  year: 2014
  ident: e_1_2_5_10_1
– ident: e_1_2_5_11_1
  doi: 10.1007/s13198-015-0376-0
– ident: e_1_2_5_36_1
– ident: e_1_2_5_41_1
– ident: e_1_2_5_44_1
– ident: e_1_2_5_6_1
  doi: 10.1016/j.jnca.2018.01.003
– ident: e_1_2_5_39_1
– ident: e_1_2_5_2_1
  doi: 10.1109/TKDE.2017.2728531
– ident: e_1_2_5_38_1
– ident: e_1_2_5_7_1
  doi: 10.1109/ACCESS.2018.2802928
– ident: e_1_2_5_19_1
  doi: 10.1145/2660859.2660969
– ident: e_1_2_5_35_1
– ident: e_1_2_5_8_1
  doi: 10.1109/JSTSP.2016.2607692
– ident: e_1_2_5_28_1
  article-title: Significant permission identification for machine learning based Android malware detection
  publication-title: IEEE Trans Ind Inform
– ident: e_1_2_5_31_1
  doi: 10.1007/978-3-540-27813-9_25
– ident: e_1_2_5_32_1
  doi: 10.1109/TIP.2017.2708506
– ident: e_1_2_5_25_1
  doi: 10.1007/978-3-319-46298-1_7
– ident: e_1_2_5_29_1
  doi: 10.1109/TPAMI.2016.2608901
– ident: e_1_2_5_21_1
  doi: 10.1109/ISCC.2012.6249380
– start-page: 6
  volume-title: Automata Implementation
  year: 1996
  ident: e_1_2_5_30_1
– ident: e_1_2_5_43_1
– ident: e_1_2_5_46_1
– ident: e_1_2_5_27_1
– ident: e_1_2_5_12_1
  doi: 10.4018/IJCAC.2017010101
– ident: e_1_2_5_23_1
  doi: 10.1145/2046707.2046775
SSID ssj0011031
Score 2.2645202
Snippet Summary This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS...
This article presents a client‐server JavaScript code rewriting‐based framework that protects and preserves the privacy of online users against XSS worms on...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
SubjectTerms Applications programs
Computer worms
Cross‐Site Scripting (XSS) worms
Decoding
Hypertext
Java
Online Social Networking (OSN) security
RSS technology
Social networks
untrusted JavaScript code
web security
XSS filters
Title A client‐server JavaScript code rewriting‐based framework to detect the XSS worms from online social network
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fcpe.4646
https://www.proquest.com/docview/2304702268
Volume 31
WOSCitedRecordID wos000490534700019&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library Full Collection 2020
  customDbUrl:
  eissn: 1532-0634
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0011031
  issn: 1532-0626
  databaseCode: DRFUL
  dateStart: 20010101
  isFulltext: true
  titleUrlDefault: https://onlinelibrary.wiley.com
  providerName: Wiley-Blackwell
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1fS8MwED90-uCL8y9Op0QQfapL2zTtHsfcEBljOAd7K02aiDC7sc356kfwM_pJvPTPpqAg-FRoLyUkudzvkrvfAVxoP9bodikLTVNgMVbHfdAX3IoV5XXbEYFQaaJwx-92g-Gw3sujKk0uTMYPsTxwM5qR7tdGwSMxq61IQ-VEXTPO-DpsOLhsWQk2bu7bg87yDsEUMMjYUh2LIm4vqGepUyvafjdGK4T5FaemhqZd_k8Xd2A7h5ekka2HXVhTyR6Ui9INJNfkfZg0iByZVMiPt3dzLovf7qJF1E_3EGLy3MlUvRrCo-QRRYyti4kuArnIfExiZa4fCOJHMuz3Cb5-nhGTrEKynpPsNJ4kWZz5AQzarYfmrZUXX7AkIgBuKZtGivmKe1pTdGM97WkntiONkEAFAlGGUpGL6CqisS0DyoVveGIQv7hMBI50D6GUjBN1BIQKzxbouDFPuvhHdJGYZK7UgvpOILlfgatiFkKZM5ObAhmjMONUdkIcyNAMZAXOl5KTjI3jB5lqMZFhro-zML1dRLjCgwpcplP2a_uw2WuZ5_FfBU9gC1FU3UpjA6tQmk9f1ClsysX8aTY9y1flJyU15-A
linkProvider Wiley-Blackwell
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3dS8MwED90Cvri_MTp1AiiT9W0TdMOn8Z0-DHHcBP2Vpo0EUHr2Ka--if4N_qXeOnHVFAQfCq0lxKSXO53l9zvAPa0H2t0u5SFpimwGKvhPugLbsWK8prtiECoNFG45bfbQb9f60zBcZELk_FDTAJuRjPS_doouAlIH32yhsqBOmSc8WmYYbiKvBLMnFw3b1qTQwRTwSCjS3UsisC94J6lzlHR9rs1-oSYX4Fqamma5X_1cREWcoBJ6tmKWIIplSxDuSjeQHJdXoFBnch7kwz5_vpmIrP47SJ6jrrpLkJMpjsZqhdDeZTcooixdjHRxVUuMn4ksTIHEAQRJOl3uwRfP4yISVchWddJFo8nSXbTfBVumqe9xpmVl1-wJGIAbimbRor5intaU3RkPe1pJ7YjjaBABQJxhlKRi_gqorEtA8qFb5hiEMG4TASOdNeglDwmah0IFZ4t0HVjnnTxj-gkMclcqQX1nUByvwIHxTSEMucmNyUy7sOMVdkJcSBDM5AV2J1IDjI-jh9kqsVMhrlGjsL0fBEBCw8qsJ_O2a_tw0bn1Dw3_iq4A3NnvatW2DpvX27CPGKqmpXeFKxCaTx8UlswK5_Hd6Phdr5EPwACqevQ
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1bS8MwFD7MC-KL84rTqRFEn-rSNk1bfBLn8DLGcAp7K02aiKB1bFNf_Qn-Rn-JJ71MBQXBp0J7UkKSk_OdnJzvAOxpP9HodikLTVNgMRbiPugLbiWK8tB2RCBUlijc9judoN8PuxU4KnNhcn6IyYGb0YxsvzYKrgaJbnyyhsqBOmSc8SmYYV7IUStnmletm_YkiGAqGOR0qY5FEbiX3LPUaZRtv1ujT4j5FahmlqZV_VcfF2GhAJjkOF8RS1BR6TJUy-INpNDlFRgcE3lvkiHfX9_MySx-u4if4162ixCT6U6G6sVQHqW3KGKsXUJ0eZWLjB9JokwAgiCCJP1ej-DrhxEx6Sok7zrJz-NJmt80X4Wb1un1yZlVlF-wJGIAbimbxor5intaU3RkPe1pJ7FjjaBABQJxhlKxi_gqpoktA8qFb5hiEMG4TASOdNdgOn1M1ToQKjxboOvGPOniH9FJYpK5UgvqO4Hkfg0OymmIZMFNbkpk3Ec5q7IT4UBGZiBrsDuRHOR8HD_I1MuZjAqNHEVZfBEBCw9qsJ_N2a_to5PuqXlu_FVwB-a6zVbUPu9cbsI8QqrQyi4K1mF6PHxSWzArn8d3o-F2sUI_AKx760s
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+client%E2%80%90server+JavaScript+code+rewriting%E2%80%90based+framework+to+detect+the+XSS+worms+from+online+social+network&rft.jtitle=Concurrency+and+computation&rft.au=Gupta%2C+Shashank&rft.au=Gupta%2C+B.B.&rft.au=Chaudhary%2C+Pooja&rft.date=2019-11-10&rft.issn=1532-0626&rft.eissn=1532-0634&rft.volume=31&rft.issue=21&rft_id=info:doi/10.1002%2Fcpe.4646&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_cpe_4646
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1532-0626&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1532-0626&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1532-0626&client=summon