A Survey of Exploitation and Detection Methods of XSS Vulnerabilities.
Miao LiuBoyu ZhangWenbin ChenXunlai ZhangPublished in: IEEE Access (2019)
Keyphrases
- benchmark datasets
- preprocessing
- significant improvement
- object detection
- detection rate
- computational cost
- qualitative and quantitative
- feature selection
- evolutionary algorithm
- false positives
- methods require
- real time
- false alarms
- detection algorithm
- semi supervised
- computer vision
- learning algorithm
- machine learning
- neural network