Rahman, 2019
ViewPDF| Publication | Publication Date | Title | 
|---|---|---|
| Steffens et al. | Don't Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild. | |
| Kirda et al. | Client-side cross-site scripting protection | |
| Khan et al. | A cognitive and concurrent cyber kill chain model | |
| Starov et al. | No honor among thieves: A large-scale analysis of malicious web shells | |
| Chang et al. | Analyzing and defending against web-based malware | |
| US20150163234A1 (en) | System and methods for protecting computing devices from malware attacks | |
| Cui et al. | A survey on XSS attack detection and prevention in web applications | |
| Soltani et al. | A survey on real world botnets and detection mechanisms | |
| US12056237B2 (en) | Analysis of historical network traffic to identify network vulnerabilities | |
| Maroofi et al. | Are you human? resilience of phishing detection to evasion techniques based on human verification | |
| Akiyama et al. | HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle | |
| Gan et al. | A Review on detection of cross-site scripting attacks (XSS) in web security | |
| Onarlioglu et al. | Sentinel: Securing legacy firefox extensions | |
| Musch et al. | Server-side browsers: exploring the web's hidden attack surface | |
| Sood et al. | Exploiting trust: stealthy attacks through socioware and insider threats | |
| Ofuonye et al. | Securing web-clients with instrumented code and dynamic runtime monitoring | |
| Fryer et al. | Malicious web pages: What if hosting providers could actually do something… | |
| Sakib et al. | Automated collection and analysis of malware disseminated via online advertising | |
| Zarras | The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security | |
| Rahman | Characterisation and detections of third-party content loading in the web | |
| Kumar et al. | A review on 0-day vulnerability testing in web application | |
| Sadan et al. | WhiteScript: Using social network analysis parameters to balance between browser usability and malware exposure | |
| Prakash et al. | On reviewing the implications of rogue antivirus | |
| Burgess et al. | Investigation of browser and web-based threats | |
| Takata et al. | Website forensic investigation to identify evidence and impact of compromise |