
References:
[1] Banerjee Raima, Baksi Aritra, Singh Nidhi,
Bishnu Sohan Kanti, Detection of XSS in web
applications using Machine Learning
Classifiers, International Conference on
Electronics, Materials Engineering & Nano-
Technology (IEMENTech) 2020 4th, Kolkata,
2020, pp. 1-5, doi:
10.1109/IEMENTech51367.2020.9270052.
[2] Monali Shetty, Chirantar Nalawade, Hybrid
approach for Detection and Analysis of SQL
and XSS vulnerabilities, International Journal
of Engineering Trends and Technology,
Vol.59, 2018, pp. 37-41, doi:
10.14445/22315381/IJETT-V59P206.
[3] Wassermann Gary, Su Zhendong, Static
detection of cross-site scripting
vulnerabilities, 2008 ACM/IEEE 30th
International Conference on Software
Engineering, Leipzig, Germany, 2008, pp.
171-180, doi: 10.1145/1368088.1368112.
[4] Fawaz Mokbal, Dan Wang, Xiaoxi Wang,
(2022). Detect Cross-Site Scripting Attacks
Using Average Word Embedding and Support
Vector Machine, International Journal of
Network Security, Vol.24, No.20-28, doi:
10.6633/IJNS.202201_24(1).03.
[5] Sanjukta Mohanty, Arup Abhinna Acharya,
Detection of XSS Vulnerabilities of Web
Application Using Security Testing
Approaches, Intelligent and Cloud
Computing, 2021, pp.267-275, doi:
10.1007/978-981-15-6202-0_27.
[6] Jasleen Kaur, Urvashi Garg, Gourav Bathla,
Detection of cross-site scripting (XSS) attacks
using machine learning techniques: a review.
Artificial Intelligence Review, Vol. 56, 2023,
pp. 1-45, doi: 10.1007/s10462-023-10433-3.
[7] Garn Bernhard, Sebastian Lang Daniel,
Leithner Manuel, Richard Kuhn D., Kacker
Raghu, Simos Dimitris, Combinatorially
XSSing Web Application Firewalls, 2021
IEEE International Conference on Software
Testing, Verification and Validation
Workshops (ICSTW), Porto de Galinhas,
Brazil, 2021, pp. 85-94, doi:
10.1109/ICSTW52544.2021.00026.
[8] Domarev V.V., Security of information
technologies. Methodology of creation of
protection systems, DiaSoft, 2002. - 688 p.,
ISBN 966-7992-02-0.
[9] Sonoda Michio, Matsuda Takeshi, Koizumi
Daiki, Hirasawa Shigeichi, On Automatic
Detection of SQL Injection Attacks by the
Feature Extraction of the Single Character,
Proceeding in the 4th International
Conference on Security of Information and
Networks, SIN 2011, Sydney, NSW,
Australia, , 2011, pp.81-86,
https://doi.org/10.1145/2070425.2070440.
[10] Zhang Jingyu, Hu Hongchao, Huo Shumin an
Li Huanruo, A XSS Attack Detection Method
Based on Subsequence Matching Algorithm,
Proceeding in 2021 IEEE International
Conference on Artificial Intelligence and
Industrial Design (AIID), Guangzhou, 2021,
pp. 83-86, doi:
https://doi.org/10.1109/AIID51893.2021.9456
515.
[11] Blerim Rexha, Arbnor Halili, Korab Rrmoku
and Dren Imeraj, Impact of secure
programming on web application
vulnerabilities, Proceeding in 2015 IEEE
International Conference on Computer
Graphics, Vision and Information Security
(CGVIS), Bhubaneswar, India, 2015, pp. 61-
66, doi:
https://doi.org/10.1109/CGVIS.2015.7449894
.
[12] D. Azshwanth, G. Sujatha, A novel automated
method to detect XSS vulnerability in
webpages, Proceeding in 2022 International
Conference on Computer Communication and
Informatics (ICCCI), Coimbatore, India,
2022, pp. 1-4, doi:
https://doi.org/10.1109/ICCCI54379.2022.974
0937.
Contribution of Individual Authors to the
Creation of a Scientific Article (Ghostwriting
Policy)
The authors equally contributed in the present
research, at all stages from the formulation of the
problem to the final findings and solution
Sources of Funding for Research Presented in a
Scientific Article or Scientific Article Itself
No funding was received for conducting this study.
Conflict of Interest
The authors have no conflicts of interest to declare.
Creative Commons Attribution License 4.0
(Attribution 4.0 International, CC BY 4.0)
This article is published under the terms of the
Creative Commons Attribution License 4.0
https://creativecommons.org/licenses/by/4.0/deed.en
_US
WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS
DOI: 10.37394/23209.2024.21.46
Komil Fikratovich Kerimov,
Zarina Ildarovna Azizova