These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
132 related articles for article (PubMed ID: 38067778)
1. Enhancing Security of Web-Based IoT Services via XSS Vulnerability Detection. Kim J; Park J Sensors (Basel); 2023 Nov; 23(23):. PubMed ID: 38067778 [TBL] [Abstract][Full Text] [Related]
2. Securing web applications against XSS and SQLi attacks using a novel deep learning approach. Tadhani JR; Vekariya V; Sorathiya V; Alshathri S; El-Shafai W Sci Rep; 2024 Jan; 14(1):1803. PubMed ID: 38245563 [TBL] [Abstract][Full Text] [Related]
3. Data augmentation-based conditional Wasserstein generative adversarial network-gradient penalty for XSS attack detection system. Mokbal FMM; Wang D; Wang X; Fu L PeerJ Comput Sci; 2020; 6():e328. PubMed ID: 33816978 [TBL] [Abstract][Full Text] [Related]
4. Generative Adversarial Network (GAN)-Based Autonomous Penetration Testing for Web Applications. Chowdhary A; Jha K; Zhao M Sensors (Basel); 2023 Sep; 23(18):. PubMed ID: 37766067 [TBL] [Abstract][Full Text] [Related]
5. Smart Home-based IoT for Real-time and Secure Remote Health Monitoring of Triage and Priority System using Body Sensors: Multi-driven Systematic Review. Talal M; Zaidan AA; Zaidan BB; Albahri AS; Alamoodi AH; Albahri OS; Alsalem MA; Lim CK; Tan KL; Shir WL; Mohammed KI J Med Syst; 2019 Jan; 43(3):42. PubMed ID: 30648217 [TBL] [Abstract][Full Text] [Related]
6. GeneMiner: A Classification Approach for Detection of XSS Attacks on Web Services. Gupta C; Singh RK; Mohapatra AK Comput Intell Neurosci; 2022; 2022():3675821. PubMed ID: 35795743 [TBL] [Abstract][Full Text] [Related]
7. Modified graph-based algorithm to analyze security threats in IoT. Arat F; Akleylek S PeerJ Comput Sci; 2023; 9():e1743. PubMed ID: 38192462 [TBL] [Abstract][Full Text] [Related]
8. Improving Security of Web Servers in Critical IoT Systems through Self-Monitoring of Vulnerabilities. Song L; GarcĂa-Valls M Sensors (Basel); 2022 Jul; 22(13):. PubMed ID: 35808499 [TBL] [Abstract][Full Text] [Related]
9. Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT. Aslam M; Ye D; Tariq A; Asad M; Hanif M; Ndzi D; Chelloug SA; Elaziz MA; Al-Qaness MAA; Jilani SF Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408312 [TBL] [Abstract][Full Text] [Related]
10. Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks. Georgescu TM; Iancu B; Zurini M Sensors (Basel); 2019 Aug; 19(15):. PubMed ID: 31374902 [TBL] [Abstract][Full Text] [Related]
11. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes. Ali B; Awad AI Sensors (Basel); 2018 Mar; 18(3):. PubMed ID: 29518023 [TBL] [Abstract][Full Text] [Related]
12. Automated Vulnerability Discovery and Exploitation in the Internet of Things. Wang Z; Zhang Y; Tian Z; Ruan Q; Liu T; Wang H; Liu Z; Lin J; Fang B; Shi W Sensors (Basel); 2019 Jul; 19(15):. PubMed ID: 31370171 [TBL] [Abstract][Full Text] [Related]
13. Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks. Dawadi BR; Adhikari B; Srivastava DK Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850675 [TBL] [Abstract][Full Text] [Related]
14. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Mrabet H; Belguith S; Alhomoud A; Jemai A Sensors (Basel); 2020 Jun; 20(13):. PubMed ID: 32605178 [TBL] [Abstract][Full Text] [Related]
15. Security Requirements for the Internet of Things: A Systematic Approach. Pal S; Hitchens M; Rabehaja T; Mukhopadhyay S Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33086542 [TBL] [Abstract][Full Text] [Related]
16. An Ontology-Based Cybersecurity Framework for the Internet of Things. Mozzaquatro BA; Agostinho C; Goncalves D; Martins J; Jardim-Goncalves R Sensors (Basel); 2018 Sep; 18(9):. PubMed ID: 30213085 [TBL] [Abstract][Full Text] [Related]
17. Framework to perform taint analysis and security assessment of IoT devices in smart cities. Bhardwaj A; Vishnoi A; Bharany S; Abdelmaboud A; Ibrahim AO; Mamoun M; Nagmeldin W PeerJ Comput Sci; 2023; 9():e1771. PubMed ID: 38192478 [TBL] [Abstract][Full Text] [Related]
18. Internet of Things for System Integrity: A Comprehensive Survey on Security, Attacks and Countermeasures for Industrial Applications. Abosata N; Al-Rubaye S; Inalhan G; Emmanouilidis C Sensors (Basel); 2021 May; 21(11):. PubMed ID: 34073975 [TBL] [Abstract][Full Text] [Related]
19. Dynamic coefficient symmetric polynomial-based secure key management scheme for Internet of Things (IoT) networks. Liu Z; Luo Y PeerJ Comput Sci; 2023; 9():e1726. PubMed ID: 38192450 [TBL] [Abstract][Full Text] [Related]
20. A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Tariq U; Ahmed I; Bashir AK; Shaukat K Sensors (Basel); 2023 Apr; 23(8):. PubMed ID: 37112457 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]