Web application has become an essential part of daily activities to provide easy accessibility that ensures better performance. It is a platform where sensitive information such as username, password, credit card details, operating system and software version. is stored that attracts intruders to generate most of their attacks. Intruders can steal valuable data by compromising web application security flaws; cross site scripting (XSS) vulnerability is one of these. Several studies have been conducted in order to prevent the XSS vulnerability. In this research, we searched Scopus Indexed articles published in the last 11 years (between 2008 and 2020) using two keywords (“XSS attack prevention” and “XSS prevention”). The purpose of this study...
Web-based applications has turn out to be very prevalent due to the ubiquity of web browsers to deli...
Abstract — As social websites get more and more users across internet, Cross Site Scripting is becom...
Cross-Site scripting attacks occur when accessing information in intermediate trusted sites. Cross-S...
Abstract: With Internet becoming ubiquitous in every aspect of our life, there is an increase in the...
Cross Site Scripting XSS attacks are most common vulnerability issues in the digital era for the Web...
Research reports indicate that more than 80 % of the web applications are vulnerable to XSS threats....
Existence of cross-site scripting (XSS) vulnerability can be traced back to 1995 during early days o...
Security is becoming one of the major concerns for web applications and other Internet based service...
Websites rely completely on complex web applications to deliver content to all users according to se...
The growth of social networking sites across the World Wide Web is directly proportional to the comp...
Affiliated to SPPU University, Web applications are useful for various online services. These web ap...
Nowadays, many web sites make extensive use of client side scripts to enhance user experience. Unfor...
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected...
Abstract- Cross-Site Scripting is one of the major’s attacks described by OWASP. The Cross Site Scri...
Cross Site Scripting (XSS) is popular security vulnerability in modern web applications. XSS attacks...
Web-based applications has turn out to be very prevalent due to the ubiquity of web browsers to deli...
Abstract — As social websites get more and more users across internet, Cross Site Scripting is becom...
Cross-Site scripting attacks occur when accessing information in intermediate trusted sites. Cross-S...
Abstract: With Internet becoming ubiquitous in every aspect of our life, there is an increase in the...
Cross Site Scripting XSS attacks are most common vulnerability issues in the digital era for the Web...
Research reports indicate that more than 80 % of the web applications are vulnerable to XSS threats....
Existence of cross-site scripting (XSS) vulnerability can be traced back to 1995 during early days o...
Security is becoming one of the major concerns for web applications and other Internet based service...
Websites rely completely on complex web applications to deliver content to all users according to se...
The growth of social networking sites across the World Wide Web is directly proportional to the comp...
Affiliated to SPPU University, Web applications are useful for various online services. These web ap...
Nowadays, many web sites make extensive use of client side scripts to enhance user experience. Unfor...
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected...
Abstract- Cross-Site Scripting is one of the major’s attacks described by OWASP. The Cross Site Scri...
Cross Site Scripting (XSS) is popular security vulnerability in modern web applications. XSS attacks...
Web-based applications has turn out to be very prevalent due to the ubiquity of web browsers to deli...
Abstract — As social websites get more and more users across internet, Cross Site Scripting is becom...
Cross-Site scripting attacks occur when accessing information in intermediate trusted sites. Cross-S...