Showing 1 - 20
of 40,180
- 1
- 2
Pagination
WebViewJSdetect: Javascript vulnerability detection in android webview via coverage-guided thread-adaptive concurrent abstract interpretation
Yuan, Zhanhui ; Yang, Zhi ; Tan, Jinglei ; et al.
In Computer Networks February 2026 275
CSRF protection in JavaScript frameworks and the security of JavaScript applications
Peguero, Ksenia ; Cheng, Xiuzhen
In High-Confidence Computing December 2021 1(2)
A Perspective View of Node Security Shield for Node.js Applications
G, Sangeetha ; Ch, Karthik ; Karthik, P. Bhanu ; et al.
2025 IEEE Madhya Pradesh Section Conference (MPCON) Madhya Pradesh Section Conference (MPCON), 2025 IEEE. :480-485 Aug, 2025
Characterizing JavaScript Security Code Smells
Kambhampati, Vikas ; Mohammed, Nehaz Hussain ; Fard, Amin Milani
Survey on JavaScript security policies and their enforcement mechanisms in a web browser
Bielova, Nataliia
In Journal of Logic and Algebraic Programming November 2013 82(8):243-262
Electrolint and security of electron applications
Peguero, Ksenia ; Cheng, Xiuzhen
In High-Confidence Computing December 2021 1(2)
Deobfuscation of JavaScript code and identification of security weaknesses through large language models
Benedetti, Giacomo ; Caviglione, Luca ; Comito, Carmela ; et al.
In Future Generation Computer Systems June 2026 179
If-transpiler: Inlining of hybrid flow-sensitive security monitor for JavaScript
Sayed, Bassam ; Traoré, Issa ; Abdelhalim, Amany
In Computers & Security June 2018 75:92-117
Fuzzing JavaScript JIT compilers with a high-quality differential test oracle
Li, Jizhe ; Xu, Haoran ; Wang, Yongjun ; et al.
In Computers & Security December 2025 159
ZipAST: Enhancing malicious JavaScript detection with sequence compression
Chen, Zixian ; Wang, Weiping ; Qin, Yan ; et al.
In Computers & Security June 2025 153
A Cloud-based Protection approach against JavaScript-based attacks to browsers
Hsu, Fu-Hau ; Hwang, Yan-Ling ; Lee, Chia-Hao ; et al.
In Computers and Electrical Engineering May 2018 68:241-251
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
Irada Rahimova ; Firangiz Qubadova ; Barayat Asker zade ; et al.
Сучасні інформаційні системи, Vol 3, Iss 4 (2019)
JACLNet:Application of adaptive code length network in JavaScript malicious code detection.
Zhang Z ; Wan L ; Chu K ; et al.
Publisher: Public Library of Science Country of Publication: United States NLM ID: 101285081 Publication Model: eCollection Cited Medium: Internet ISSN: 1932-6203 (Electronic) Linking ISSN: 19326203 NLM ISO Abbreviation: PLoS One Subsets: MEDLINE
Quantitative bounds on the security-critical resource consumption of JavaScript apps
Franzen, Daniel ; Aspinall, David ; Stark, Ian
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript
Mehrnezhad, Maryam ; Toreini, Ehsan ; Shahandashti, Siamak F. ; et al.
In Journal of Information Security and Applications February 2016 26:23-38
This result is not available to guest users.
Log in for full access.
JAVASCRIPT SECURITY USING CRYPTOGRAPHIC HASH FUNCTIONS
Rahimova, Irada ; Qubadova, Firangiz ; Asker zade, Barayat ; et al.
Advanced Information Systems; Vol. 3 No. 4 (2019): Advanced Information Systems; 105-108; 105-108; 105-108; 2522-9052
A User's and Programmer's View of the New JavaScript Security Model
Internet technologies and systems; USENIX symposium on internet technologies and systems
Anupam, V. ; Kristol, D. M. ; Mayer, A.
PROCEEDINGS OF THE USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS. :177-186
Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach
Krishnan, Muralitharan ; Lim, Yongdo ; Perumal, Seethalakshmi ; et al.
In Digital Communications and Networks June 2024 10(3):716-727
IoT-based smart irrigation management system to enhance agricultural water security using embedded systems, telemetry data, and cloud computing
Morchid, Abdennabi ; Jebabra, Rachid ; Khalid, Haris M. ; et al.
In Results in Engineering September 2024 23
- 1
- 2