{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:51:03Z","timestamp":1742939463556,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":20,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789400772618"},{"type":"electronic","value":"9789400772625"}],"license":[{"start":{"date-parts":[[2013,11,13]],"date-time":"2013-11-13T00:00:00Z","timestamp":1384300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,11,13]],"date-time":"2013-11-13T00:00:00Z","timestamp":1384300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-94-007-7262-5_76","type":"book-chapter","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T17:02:50Z","timestamp":1384275770000},"page":"663-672","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Detecting Mechanism for Cross-Site Script Attacks in the Cloud"],"prefix":"10.1007","author":[{"given":"Wei","family":"Kan","sequence":"first","affiliation":[]},{"given":"Tsu-Yang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Han","sequence":"additional","affiliation":[]},{"given":"Chun-Wei","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Chien-Ming","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jeng-Shyang","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,13]]},"reference":[{"key":"76_CR1","doi-asserted-by":"crossref","unstructured":"Jovanovic N, Kruegel K, Kirda E (2006) Precise alias analysis for static detection of web application vulnerabilities. In: 2006 workshop on programming languages and analysis for security. ACM press, New York, pp 27\u201336","DOI":"10.1145\/1134744.1134751"},{"key":"76_CR2","doi-asserted-by":"crossref","unstructured":"Wassermann G, Su z (2008) Static detection of cross-site scripting vulnerabilities. In: 30th international conference on software engineering. IEEE press, New York, pp 171\u2013180","DOI":"10.1145\/1368088.1368112"},{"key":"76_CR3","doi-asserted-by":"crossref","unstructured":"Zhang XH, Wang ZJ (2010) A static analysis tool for detecting web application injection vulnerabilities for asp program. In: 2nd international conference on e-business and information system security. IEEE press, New York, pp 1\u20135","DOI":"10.1109\/EBISS.2010.5473561"},{"key":"76_CR4","doi-asserted-by":"crossref","unstructured":"Jim T, Swamy N, Hicks M (2007) Defeating script injection attacks with browser-enforced embedded policies. In: 16th international conference on World Wide Web. ACM press, New York, pp 601\u2013610","DOI":"10.1145\/1242572.1242654"},{"key":"76_CR5","unstructured":"Vogt P, Nentwich F, Jovanovic N, Kirda E, Christopher K, Vigna G (2007) Cross-site scripting prevention with dynamic data tainting and static analysis. In: international symposium on network and distributed system security. IEEE press, New York, pp 201\u2013210"},{"key":"76_CR6","doi-asserted-by":"crossref","unstructured":"Lam MS, Martin M, Whaley J (2008) Securing web applications with static and dynamic information flow tracking. In: 2008 ACM SIGPLAN symposium on evaluation and semantics-based program manipulation. ACM press, New York, pp 3\u201312","DOI":"10.1145\/1328408.1328410"},{"key":"76_CR7","unstructured":"Zhang Q, Chen H, Sun J (2010) An execution-flow based method for detecting cross-site scripting attacks. In: 2nd international conference on software engineering and data mining. IEEE press, New York, pp 160\u2013165"},{"key":"76_CR8","doi-asserted-by":"crossref","unstructured":"Guarnieri S, Pistoia M, Tripp O, Dolby J, Teihet S, Berg R (2011) Saving the World Wide Web from vulnerable JavaScript. In: 11th international symposium on software testing and analysis. ACM press, New York, pp 177\u2013187","DOI":"10.1145\/2001420.2001442"},{"key":"76_CR9","unstructured":"Gundy M, Chen H (2009) Noncespaces: using randomization to enforce information flow tracking and thwart cross-site scripting attacks. In: International symposium on network and distributed system security. IEEE press, New York, pp 123\u2013130"},{"key":"76_CR10","unstructured":"Johns M, Engelmann B, Posegga J (2011) S2XS2: a server side approach to automatically detect XSS attacks. In: International conference on computer security applications. IEEE press, New York, pp 335\u2013344"},{"key":"76_CR11","unstructured":"Shahriar H, Zulkernine M (2009) Injecting comments to detect JavaScript code injection attacks. In: 35th international conference on computer software and applications. IEEE press, New York, pp 104\u2013109"},{"key":"76_CR12","doi-asserted-by":"crossref","unstructured":"Wurzinger P, Platzer C, Ludl C, Kirda E, Kruegel C (2009) SWAP: mitigating XSS attacks using a reverse proxy. In: 2009 ICSE workshop on software engineering for secure systems. IEEE press, New York, pp 33\u201339","DOI":"10.1109\/IWSESS.2009.5068456"},{"key":"76_CR13","doi-asserted-by":"crossref","unstructured":"Komiya R, Paik I, Hisada M (2011) Classification of malicious web code by machine learning. In: 3rd international conference on awareness science and technology. IEEE press, New York, pp 406\u2013411","DOI":"10.1109\/ICAwST.2011.6163109"},{"key":"76_CR14","doi-asserted-by":"crossref","unstructured":"Choi J, Kim H, Choi C, Kim Pk (2011) Efficient malicious code detection using n-gram analysis and SVM. In: 14th international conference on network-based information systems. IEEE press, New York, pp 618\u2013621","DOI":"10.1109\/NBiS.2011.104"},{"key":"76_CR15","doi-asserted-by":"crossref","unstructured":"Nunan AE, Souto E, Santos EMD, Feitosa E (2012) Automatic classification of cross-site scripting in web pages using document-based and URL-based features. In: 2012 IEEE symposium on computers and communications. IEEE press, New York, pp 702\u2013707","DOI":"10.1109\/ISCC.2012.6249380"},{"key":"76_CR16","doi-asserted-by":"crossref","unstructured":"Shar LK, Tan HBK (2012) Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities. In: 2012 ICSE international conference on software engineering. IEEE press, New York, pp 1293\u20131296","DOI":"10.1109\/ICSE.2012.6227096"},{"key":"76_CR17","doi-asserted-by":"crossref","unstructured":"Iha G, Doi H (2009) An implementation of the binding mechanism in the web browser for preventing XSS attacks. In: international conference on availability, reliability and security. IEEE press, New York, pp 996\u2013971","DOI":"10.1109\/ARES.2009.19"},{"key":"76_CR18","unstructured":"Putthacharoen R, Bunyatnoparat P (2011) Protecting cookies from cross site script attacks using dynamic cookies rewriting technique. In: international conference on advanced communication technology. IEEE press, New York, pp 1090\u20131094"},{"issue":"4","key":"76_CR19","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1049\/iet-sen.2011.0084","volume":"6","author":"LK Shar","year":"2012","unstructured":"Shar LK, Tan HBK (2012) Auditing the XSS defence features implemented in web application programs. IET Software 6(4):377\u2013390","journal-title":"IET Software"},{"key":"76_CR20","unstructured":"XSS Attacks Information. http:\/\/www.xssed.com"}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Technologies, Embedded and Multimedia for Human-centric Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-007-7262-5_76","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,7]],"date-time":"2023-02-07T19:36:33Z","timestamp":1675798593000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-94-007-7262-5_76"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,13]]},"ISBN":["9789400772618","9789400772625"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-94-007-7262-5_76","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2013,11,13]]},"assertion":[{"value":"13 November 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}