{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T14:33:25Z","timestamp":1778250805939,"version":"3.51.4"},"reference-count":123,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T00:00:00Z","timestamp":1679529600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T00:00:00Z","timestamp":1679529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s10462-023-10433-3","type":"journal-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T03:02:51Z","timestamp":1679540571000},"page":"12725-12769","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":74,"title":["Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review"],"prefix":"10.1007","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1947-9360","authenticated-orcid":false,"given":"Jasleen","family":"Kaur","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Urvashi","family":"Garg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4198-9647","authenticated-orcid":false,"given":"Gourav","family":"Bathla","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,3,23]]},"reference":[{"key":"10433_CR1","unstructured":"2000 DARPA Intrusion Detection Scenario Specific Datasets | MIT Lincoln Laboratory. (n.d.). https:\/\/www.ll.mit.edu\/r-d\/datasets\/2000-darpa-intrusion-detection-scenario-specific-datasets. Accessed 2 Nov 2021"},{"key":"10433_CR2","doi-asserted-by":"publisher","first-page":"128617","DOI":"10.1109\/ACCESS.2019.2939870","volume":"7","author":"S Abaimov","year":"2019","unstructured":"Abaimov S, Bianchi G (2019) CODDLE: Code-injection detection with deep learning. IEEE Access 7:128617\u2013128627. https:\/\/doi.org\/10.1109\/ACCESS.2019.2939870","journal-title":"IEEE Access"},{"issue":"2","key":"10433_CR3","doi-asserted-by":"publisher","first-page":"4075","DOI":"10.32604\/CMC.2022.020389","volume":"70","author":"A Abdullah Alqarni","year":"2022","unstructured":"Abdullah Alqarni A, Alsharif N, Ahmad Khan N, Georgieva L, Pardade E, Alzahrani YM (2022) MNN-XSS: modular neural network based approach for XSS attack detection. Comput Mater Continua 70(2):4075\u20134085. https:\/\/doi.org\/10.32604\/CMC.2022.020389","journal-title":"Comput Mater Continua"},{"issue":"2","key":"10433_CR4","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1007\/S10462-021-09992-0","volume":"55","author":"B Akay","year":"2021","unstructured":"Akay B, Karaboga D, Akay R (2021) A comprehensive survey on optimizing deep learning models by metaheuristics. Artif Intell Rev 55(2):829\u2013894. https:\/\/doi.org\/10.1007\/S10462-021-09992-0","journal-title":"Artif Intell Rev"},{"issue":"1","key":"10433_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1678-4804-20-4","volume":"20","author":"R Akrout","year":"2014","unstructured":"Akrout R, Alata E, Kaaniche M, Nicomette V (2014) An automated black box approach for web vulnerability identification and attack scenario generation. J Brazilian Comput Soc 20(1):1\u201316. https:\/\/doi.org\/10.1186\/1678-4804-20-4","journal-title":"J Brazilian Comput Soc"},{"issue":"6","key":"10433_CR6","first-page":"1731","volume":"10","author":"F Alam","year":"2017","unstructured":"Alam F, Pachauri S (2017) Comparative study of J48, naive bayes and one-R classification technique for credit card fraud detection using WEKA. Adv Comput Sci Technol 10(6):1731\u20131743","journal-title":"Adv Comput Sci Technol"},{"key":"10433_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S10462-021-10125-W","volume":"2022","author":"A Aldahdooh","year":"2022","unstructured":"Aldahdooh A, Hamidouche W, Fezza SA, D\u00e9forges O (2022) Adversarial example detection for DNN models: a review and experimental comparison. Artif Intell Rev 2022:1\u201360. https:\/\/doi.org\/10.1007\/S10462-021-10125-W","journal-title":"Artif Intell Rev"},{"key":"10433_CR8","unstructured":"Alexa - Top sites. (n.d.). https:\/\/www.alexa.com\/topsites. Accessed 2 Nov 2021"},{"key":"10433_CR9","doi-asserted-by":"publisher","unstructured":"Banerjee, R., Baksi, A., Singh, N., & Bishnu, S. K. (2020, October 2). Detection of XSS in web applications using Machine Learning Classifiers. 2020 4th International Conference on Electronics, Materials Engineering & Nano-Technology (IEMENTech). https:\/\/doi.org\/10.1109\/IEMENTech51367.2020.9270052","DOI":"10.1109\/IEMENTech51367.2020.9270052"},{"issue":"9","key":"10433_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1353-4858(16)30086-1","volume":"2016","author":"R Brewer","year":"2016","unstructured":"Brewer R (2016) Ransomware attacks: detection, prevention and cure. Netw Secur 2016(9):5\u20139. https:\/\/doi.org\/10.1016\/S1353-4858(16)30086-1","journal-title":"Netw Secur"},{"key":"10433_CR11","doi-asserted-by":"publisher","DOI":"10.3389\/fninf.2019.00053","author":"S Chauhan","year":"2019","unstructured":"Chauhan S, Vig L, Filippo De Grazia M, Corbetta M, Ahmad S, Zorzi M (2019) A Comparison of shallow and deep learning methods for predicting cognitive performance of stroke patients from mri lesion images. Front Neuroinform. https:\/\/doi.org\/10.3389\/fninf.2019.00053","journal-title":"Front Neuroinform"},{"key":"10433_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-019-0027-x","volume":"2","author":"T Chen","year":"2019","unstructured":"Chen T, Liu J, Xiang Y, Niu W, Tong E, Han Z (2019) Adversarial attack and defense in reinforcement learning-from AI security view. Cybersecurity 2:1. https:\/\/doi.org\/10.1186\/s42400-019-0027-x","journal-title":"Cybersecurity"},{"key":"10433_CR13","unstructured":"Cimpanu Catalin. (2018). British Airways breach caused by the same group that hit Ticketmaster | ZDNet. ZDNET, A RED VENTURES COMPANY. https:\/\/www.zdnet.com\/article\/british-airways-breach-caused-by-the-same-group-that-hit-ticketmaster\/"},{"key":"10433_CR14","unstructured":"CISCO. (2021). Defending Against Critical Threats. https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/defending-against-critical-threats.html?CCID=cc000160&DTID=odicdc000016&OID=rptsc024689"},{"key":"10433_CR15","doi-asserted-by":"publisher","unstructured":"Conti, M., Dargahi, T., & Dehghantanha, A. (2018). Cyber threat intelligence: Challenges and opportunities. In Advances in Information Security (Vol. 70, pp. 1\u20136). Springer New York LLC. https:\/\/doi.org\/10.1007\/978-3-319-73951-9_1","DOI":"10.1007\/978-3-319-73951-9_1"},{"key":"10433_CR16","unstructured":"Dada, E. G. (2017). A Hybridized SVM-kNN-pdAPSO Approach to Intrusion Detection System. In University of Maiduguri Faculty of Engineering Seminar Series (Vol. 8). https:\/\/www.researchgate.net\/publication\/316145216_A_Hybridized_SVM-kNN-pdAPSO_Approach_to_Intrusion_Detection_System"},{"key":"10433_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024568","author":"Dali Zhu","year":"2017","unstructured":"Zhu Dali, Jin Hao, Ying Yang Wu, D., & Weiyi Chen. (2017) DeepFlow: deep learning-based malware detection by mining android application for abnormal usage of sensitive data. 2017 IEEE Symposium Comput Commun (ISCC). https:\/\/doi.org\/10.1109\/ISCC.2017.8024568","journal-title":"2017 IEEE Symposium Comput Commun (ISCC)"},{"key":"10433_CR18","doi-asserted-by":"publisher","first-page":"100317","DOI":"10.1016\/J.COSREV.2020.100317","volume":"39","author":"P Dixit","year":"2021","unstructured":"Dixit P, Silakari S (2021) Deep learning algorithms for cybersecurity applications: a technological and status review. Comput Sci Rev 39:100317. https:\/\/doi.org\/10.1016\/J.COSREV.2020.100317","journal-title":"Comput Sci Rev"},{"issue":"2","key":"10433_CR19","doi-asserted-by":"publisher","first-page":"319","DOI":"10.3390\/jcp1020018","volume":"1","author":"JR Dora","year":"2021","unstructured":"Dora JR, Nemoga K (2021) Ontology for cross-site-scripting (XSS) attack in cybersecurity. J Cybersecur Privacy 1(2):319\u2013339. https:\/\/doi.org\/10.3390\/jcp1020018","journal-title":"J Cybersecur Privacy"},{"key":"10433_CR20","unstructured":"EOIN KEARY. (n.d.). 2019 VULNERABILITY STATISTICS REPORT. https:\/\/www.edgescan.com\/wp-content\/uploads\/2019\/02\/edgescan-Vulnerability-Stats-Report-2019.pdf. Accessed 2 Sep 2021"},{"key":"10433_CR21","doi-asserted-by":"publisher","first-page":"8","DOI":"10.3390\/FI11080177","volume":"11","author":"Y Fang","year":"2019","unstructured":"Fang Y, Huang C, Xu Y, Li Y (2019) RLXSS: Optimizing XSS detection model to defend against adversarial attacks based on reinforcement learning. Future Internet 11:8. https:\/\/doi.org\/10.3390\/FI11080177","journal-title":"Future Internet"},{"key":"10433_CR22","doi-asserted-by":"publisher","unstructured":"Fang, Y., Li, Y., Liu, L., & Huang, C. (2018). DeepXSS: Cross site scripting detection based on deep learning. ACM International Conference Proceeding Series. https:\/\/doi.org\/10.1145\/3194452.3194469","DOI":"10.1145\/3194452.3194469"},{"key":"10433_CR23","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/J.ADHOC.2018.09.014","volume":"84","author":"F Feng","year":"2019","unstructured":"Feng F, Liu X, Yong B, Zhou R, Zhou Q (2019) Anomaly detection in ad-hoc networks based on deep learning model: a plug and play device. Ad Hoc Netw 84:82\u201389. https:\/\/doi.org\/10.1016\/J.ADHOC.2018.09.014","journal-title":"Ad Hoc Netw"},{"issue":"10","key":"10433_CR24","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(17)30089-1","volume":"2017","author":"S Furnell","year":"2017","unstructured":"Furnell S, Emm D (2017) The ABC of ransomware protection. Comput Fraud Secur 2017(10):5\u201311. https:\/\/doi.org\/10.1016\/S1361-3723(17)30089-1","journal-title":"Comput Fraud Secur"},{"key":"10433_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2010.5706699","author":"W Gao","year":"2010","unstructured":"Gao W, Morris T, Reaves B, Richey D (2010) On SCADA control system command and response injection and intrusion detection. General Mem Meet ECrime Res Summit ECrime. https:\/\/doi.org\/10.1109\/ECRIME.2010.5706699","journal-title":"General Mem Meet ECrime Res Summit ECrime."},{"key":"10433_CR200","unstructured":"Guo Y, Pan Y, Zhang Z, Li L, Jamshed MA, Moon Y, Kim D, Han D, Park K, Jamshed M A, Berger DS, Sitaraman RK, Harchol-Balter M, Pfaff B, Pettit J, Koponen T, Jackson E, Zhou A, Rajahalme J, \u2026 Security I. T (2017) Same-origin policy: Evaluation in modern browsers. In Proceedings of the Same-Origin Policy: Evaluation in Modern Browsers. Nsdi, 40(4): 97\u2013112"},{"issue":"4","key":"10433_CR26","doi-asserted-by":"publisher","first-page":"2861","DOI":"10.1007\/S11831-020-09478-2","volume":"28","author":"R Geetha","year":"2020","unstructured":"Geetha R, Thilagam T (2020) A review on the effectiveness of machine learning and deep learning algorithms for cyber security. Arch Comput Methods Eng 28(4):2861\u20132879. https:\/\/doi.org\/10.1007\/S11831-020-09478-2","journal-title":"Arch Comput Methods Eng"},{"key":"10433_CR27","unstructured":"GitHub - Morzeux\/HttpParamsDataset. (n.d.). https:\/\/github.com\/Morzeux\/HttpParamsDataset. Accessed 2 Nov 2021"},{"key":"10433_CR28","doi-asserted-by":"publisher","first-page":"100361","DOI":"10.1016\/J.COSREV.2021.100361","volume":"40","author":"V Gkioulos","year":"2021","unstructured":"Gkioulos V, Chowdhury N (2021) Cyber security training for critical infrastructure protection: a literature review. Comput Sci Rev 40:100361. https:\/\/doi.org\/10.1016\/J.COSREV.2021.100361","journal-title":"Comput Sci Rev"},{"key":"10433_CR29","doi-asserted-by":"crossref","unstructured":"Gupta B.B., & Chaudhary Pooja. (2020). Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures. (First). CRC Press. https:\/\/www.google.co.in\/books\/edition\/Cross_Site_Scripting_Attacks\/697SDwAAQBAJ?hl=en&gbpv=0&kptab=overview","DOI":"10.1201\/9780429351327"},{"issue":"1","key":"10433_CR30","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1007\/S13198-015-0376-0","volume":"8","author":"S Gupta","year":"2015","unstructured":"Gupta S, Gupta BB (2015) Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art. Int J Syst Assurance Eng Manag 8(1):512\u2013530. https:\/\/doi.org\/10.1007\/S13198-015-0376-0","journal-title":"Int J Syst Assurance Eng Manag"},{"key":"10433_CR31","doi-asserted-by":"publisher","DOI":"10.5013\/ijssst.a.19.02.06","author":"MdM Hassan","year":"2018","unstructured":"Hassan MdM, Nipa SS, Akter M, Haque R, Deepa FN, Rahman MM, Siddiqui Md, Sharif MdH (2018) Broken authentication and session management vulnerability: a case study of web application. Int J Simul. https:\/\/doi.org\/10.5013\/ijssst.a.19.02.06","journal-title":"Int J Simul"},{"key":"10433_CR32","doi-asserted-by":"publisher","unstructured":"Heiderich, M., Schwenk, J., Frosch, T., Magazinius, J., & Yang, E. Z. (2013). mXSS attacks: Attacking well-secured web-applications by using innerHTML mutations. Proceedings of the ACM Conference on Computer and Communications Security, 777\u2013788. https:\/\/doi.org\/10.1145\/2508859.2516723","DOI":"10.1145\/2508859.2516723"},{"issue":"4","key":"10433_CR33","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/S1361-3723(21)00040-3","volume":"2021","author":"J Hickling","year":"2021","unstructured":"Hickling J (2021) What is DOM XSS and why should you care? Comput Fraud Secur 2021(4):6\u201310. https:\/\/doi.org\/10.1016\/S1361-3723(21)00040-3","journal-title":"Comput Fraud Secur"},{"key":"10433_CR34","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-030-64719-3_35","volume":"178","author":"XD Hoang","year":"2020","unstructured":"Hoang XD (2020) Detecting common web attacks based on machine learning using web log. Lecture Notes Networks and Syst 178:311\u2013318. https:\/\/doi.org\/10.1007\/978-3-030-64719-3_35","journal-title":"Lecture Notes Networks and Syst"},{"key":"10433_CR35","unstructured":"Introducing a powerful open source social networking engine. (n.d.). https:\/\/elgg.org\/. Accessed 2 Nov 2021"},{"key":"10433_CR36","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1007\/978-981-15-5400-1_69","volume":"1171","author":"L Jagajeevan Rao","year":"2021","unstructured":"Jagajeevan Rao L, Nazeer Basha SK, Rama Krishna V (2021) Prevention and analysing on cross site scripting. Adv Intell Syst Comput 1171:731\u2013739. https:\/\/doi.org\/10.1007\/978-981-15-5400-1_69","journal-title":"Adv Intell Syst Comput"},{"issue":"2","key":"10433_CR37","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/TSUSC.2018.2793284","volume":"5","author":"F Jiang","year":"2020","unstructured":"Jiang F, Fu Y, Gupta BB, Liang Y, Rho S, Lou F, Meng F, Tian Z (2020) Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans Sustain Comput 5(2):204\u2013212. https:\/\/doi.org\/10.1109\/TSUSC.2018.2793284","journal-title":"IEEE Trans Sustain Comput"},{"key":"10433_CR38","doi-asserted-by":"publisher","unstructured":"Jian-hua Li. (2021). Cyber Security Meets Machine Learning. In Cyber Security Meets Machine Learning. Springer Singapore. https:\/\/doi.org\/10.1007\/978-981-33-6726-5","DOI":"10.1007\/978-981-33-6726-5"},{"key":"10433_CR39","doi-asserted-by":"publisher","unstructured":"Kascheev, S., & Olenchikova, T. (2020). Detecting Cross-Site Scripting (XSS) Using Machine Learning Methods. 2020 Global Smart Industry Conference (GloSIC). https:\/\/doi.org\/10.1109\/GloSIC50886.2020.9267866","DOI":"10.1109\/GloSIC50886.2020.9267866"},{"key":"10433_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100431","author":"S Katsikeas","year":"2021","unstructured":"Katsikeas S, Johnson P, Ekstedt M, Lagerstr\u00f6m R (2021) Research communities in cyber security: a comprehensive literature review. Comput Sci Rev. https:\/\/doi.org\/10.1016\/j.cosrev.2021.100431","journal-title":"Comput Sci Rev"},{"key":"10433_CR41","doi-asserted-by":"publisher","unstructured":"Kaur, G., Malik, Y., Samuel, H., & Jaafar, F. (2018). Detecting blind cross-site scripting attacks using machine learning. ACM International Conference Proceeding Series, 22\u201325. https:\/\/doi.org\/10.1145\/3297067.3297096","DOI":"10.1145\/3297067.3297096"},{"key":"10433_CR42","doi-asserted-by":"crossref","unstructured":"Kaur, J., & Garg, U. (2022). State-of-the-Art Survey on Web Vulnerabilities, Threat Vectors, and Countermeasures. In: Dr. R. Aggarwal, Dr. J. He, Dr. E. Shubhakar Pilli, & Dr. S. Kumar (Eds) Cyber Security in Intelligent Computing and Communications. Springer, Singapore. (pp. 3\u201317).","DOI":"10.1007\/978-981-16-8012-0_1"},{"issue":"12","key":"10433_CR43","doi-asserted-by":"publisher","first-page":"7859","DOI":"10.1007\/S00521-019-04187-9","volume":"32","author":"S Kaur","year":"2019","unstructured":"Kaur S, Singh M (2019) Hybrid intrusion detection and signature generation using deep recurrent neural networks. Neural Comput Appl 32(12):7859\u20137877. https:\/\/doi.org\/10.1007\/S00521-019-04187-9","journal-title":"Neural Comput Appl"},{"key":"10433_CR44","unstructured":"KDD Cup 1999 Data. (n.d.). http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html. Accessed 2 Nov 2021"},{"key":"10433_CR45","unstructured":"Keary Eoin. (n.d.). 2021 VULNERABILITY STATISTICS REPORT EDGESCAN. In EdgeScan Report. https:\/\/info.edgescan.com\/hubfs\/Edgescan2021StatsReport.pdf?hsCtaTracking=9601b027-23d3-443f-b438-fcb671cfda06%7Cb222011c-0b6d-440b-aed8-64d37dec66e2. Accessed 2 Sep 2021"},{"key":"10433_CR46","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5360472","author":"N Khan","year":"2017","unstructured":"Khan N, Abdullah J, Khan AS (2017) Defending malicious script attacks using machine learning classifiers. Wireless Commun Mobile Comput. https:\/\/doi.org\/10.1155\/2017\/5360472","journal-title":"Wireless Commun Mobile Comput"},{"key":"10433_CR47","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-20550-2_1","volume":"9148","author":"A Kharraz","year":"2015","unstructured":"Kharraz A, Robertson W, Balzarotti D, Bilge L, Kirda E (2015) Cutting the Gordian knot: a look under the hood of ransomware attacks. Lecture Notes Comput Sci 9148:3\u201324. https:\/\/doi.org\/10.1007\/978-3-319-20550-2_1","journal-title":"Lecture Notes Comput Sci"},{"key":"10433_CR48","doi-asserted-by":"publisher","unstructured":"Kokila, R. T., Thamarai Selvi, S., & Govindarajan, K. (2015). DDoS detection and analysis in SDN-based environment using support vector machine classifier. 6th International Conference on Advanced Computing, ICoAC 2014, 205\u2013210. https:\/\/doi.org\/10.1109\/ICOAC.2014.7229711","DOI":"10.1109\/ICOAC.2014.7229711"},{"key":"10433_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/J.COSREV.2019.05.002","volume":"33","author":"R Kumar","year":"2019","unstructured":"Kumar R, Goyal R (2019) On cloud security requirements, threats, vulnerabilities and countermeasures: a survey. Comput Sci Rev 33:1\u201348. https:\/\/doi.org\/10.1016\/J.COSREV.2019.05.002","journal-title":"Comput Sci Rev"},{"key":"10433_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00448-4","volume":"8","author":"FE Laghrissi","year":"2021","unstructured":"Laghrissi FE, Douzi S, Douzi K, Hssina B (2021) Intrusion detection systems using long short-term memory (LSTM). J Big Data 8:1. https:\/\/doi.org\/10.1186\/s40537-021-00448-4","journal-title":"J Big Data"},{"key":"10433_CR51","doi-asserted-by":"publisher","unstructured":"Lei, L., Chen, M., He, C., & Li, D. (2020). XSS Detection Technology Based on LSTM-Attention. 2020 5th International Conference on Control, Robotics and Cybernetics, CRC 2020, 175\u2013180. https:\/\/doi.org\/10.1109\/CRC51253.2020.9253484","DOI":"10.1109\/CRC51253.2020.9253484"},{"key":"10433_CR52","unstructured":"Leyden, J. (2020). XSS vulnerability in \u2018Login with Facebook\u2019 button earns $20,000 bug bounty. PortSwigger. https:\/\/portswigger.net\/daily-swig\/xss-vulnerability-in-login-with-facebook-button-earns-20-000-bug-bounty"},{"issue":"12","key":"10433_CR53","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1631\/FITEE.1800573","volume":"19","author":"J Li","year":"2018","unstructured":"Li J, Hua (2018) Cyber security meets artificial intelligence: a survey. Front Inform Technol Electron Eng 19(12):1462\u20131474. https:\/\/doi.org\/10.1631\/FITEE.1800573","journal-title":"Front Inform Technol Electron Eng"},{"key":"10433_CR54","unstructured":"Lipton, Z. C., Berkowitz, J., & Elkan, C. (2015). A Critical Review of Recurrent Neural Networks for Sequence Learning. http:\/\/arxiv.org\/abs\/1506.00019"},{"issue":"8","key":"10433_CR55","doi-asserted-by":"publisher","first-page":"5810","DOI":"10.1109\/TII.2020.3038761","volume":"17","author":"C Luo","year":"2021","unstructured":"Luo C, Tan Z, Min G, Gan J, Shi W, Tian Z (2021) A novel web attack detection system for internet of things via ensemble classification. IEEE Trans Industr Inf 17(8):5810\u20135818. https:\/\/doi.org\/10.1109\/TII.2020.3038761","journal-title":"IEEE Trans Industr Inf"},{"key":"10433_CR56","unstructured":"Matt, F. (2021). Application Model & Same-Origin Policy. In Lecture Notes on Web Security: Application Model & Same-Origin Policy."},{"key":"10433_CR57","doi-asserted-by":"publisher","unstructured":"Melicher, W., Fung, C., Bauer, L., & Jia, L. (2021). Towards a lightweight, hybrid approach for detecting DOM XSS vulnerabilities with machine learning. The Web Conference 2021\u2014Proceedings of the World Wide Web Conference, WWW 2021, 2684\u20132695. https:\/\/doi.org\/10.1145\/3442381.3450062","DOI":"10.1145\/3442381.3450062"},{"key":"10433_CR58","unstructured":"C.C. Michael, & Steven Lavenhar. (2013). Source Code Analysis Tools - Overview | CISA. Cybersecurity & Infrastructure Security Agency. https:\/\/us-cert.cisa.gov\/bsi\/articles\/tools\/source-code-analysis\/source-code-analysis-tools---overview"},{"key":"10433_CR59","unstructured":"Microsoft Teams security vulnerability left users open to XSS via flawed stickers feature | The Daily Swig. (n.d.). https:\/\/portswigger.net\/daily-swig\/microsoft-teams-security-vulnerability-left-users-open-to-xss-via-flawed-stickers-feature. Accessed 10 Oct 2022"},{"key":"10433_CR60","unstructured":"Mnih, V., Heess, N., Graves, A., & Kavukcuoglu, K. (2014). Recurrent Models of Visual Attention. Advances in Neural Information Processing Systems, 3(January), 2204\u20132212. https:\/\/arxiv.org\/abs\/1406.6247v1"},{"key":"10433_CR61","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/3092566","volume":"50","author":"G Mohammad","year":"2017","unstructured":"Mohammad G, Reza S (2017) Software vulnerability analysis and discovery using machine-learning and data-mining techniques. ACM Comput Surv (CSUR) 50:4. https:\/\/doi.org\/10.1145\/3092566","journal-title":"ACM Comput Surv (CSUR)"},{"key":"10433_CR62","doi-asserted-by":"publisher","first-page":"100567","DOI":"10.1109\/ACCESS.2019.2927417","volume":"7","author":"FMM Mokbal","year":"2019","unstructured":"Mokbal FMM, Dan W, Imran A, Jiuchuan L, Akhtar F, Xiaoxi W (2019) MLPXSS: an Integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique. IEEE Access 7:100567\u2013100580. https:\/\/doi.org\/10.1109\/ACCESS.2019.2927417","journal-title":"IEEE Access"},{"issue":"7","key":"10433_CR63","doi-asserted-by":"publisher","first-page":"2881","DOI":"10.1007\/S11227-015-1604-8","volume":"73","author":"D Moon","year":"2015","unstructured":"Moon D, Im H, Kim I, Park JH (2015) DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks. J Supercomput 73(7):2881\u20132895. https:\/\/doi.org\/10.1007\/S11227-015-1604-8","journal-title":"J Supercomput"},{"key":"10433_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S10207-021-00551-W","volume":"2021","author":"K Munonye","year":"2021","unstructured":"Munonye K, P\u00e9ter M (2021) Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow. Int J Inf Secur 2021:1\u201315. https:\/\/doi.org\/10.1007\/S10207-021-00551-W","journal-title":"Int J Inf Secur"},{"key":"10433_CR65","unstructured":"Nidecki Tomasz Andrzej. (2019). Mutation XSS in Google Search. THE ACUNETIX BLOG. https:\/\/www.acunetix.com\/blog\/web-security-zone\/mutation-xss-in-google-search\/"},{"key":"10433_CR66","unstructured":"G. Nick. (2021). The Most Telling Cyber Security Statistics in 2021 [Infographic]. Cyber Security Stats\u2014Infographic. https:\/\/techjury.net\/blog\/cyber-security-statistics\/"},{"key":"10433_CR67","unstructured":"Novinson Michael. (2021). The 10 Biggest Data Breaches Of 2021 (So Far). CRN News. https:\/\/www.crn.com\/slide-shows\/security\/the-10-biggest-data-breaches-of-2021-so-far-\/2"},{"key":"10433_CR68","doi-asserted-by":"publisher","unstructured":"Olalere, M., Abdullah, M. T., Mahmod, R., & Abdullah, A. (2016). Identification and Evaluation of Discriminative Lexical Features of Malware URL for Real-Time Classification. 2016 International Conference on Computer and Communication Engineering (ICCCE). https:\/\/doi.org\/10.1109\/ICCCE.2016.31","DOI":"10.1109\/ICCCE.2016.31"},{"key":"10433_CR69","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2497471","author":"A Onan","year":"2018","unstructured":"Onan A (2018) Biomedical text categorization based on ensemble pruning and optimized topic modelling. Comput Math Methods Med. https:\/\/doi.org\/10.1155\/2018\/2497471","journal-title":"Comput Math Methods Med"},{"issue":"1","key":"10433_CR70","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1177\/0165551516677911","volume":"44","author":"A Onan","year":"2018","unstructured":"Onan A (2018b) An ensemble scheme based on language function analysis and feature engineering for text genre classification. J Inf Sci 44(1):28\u201347. https:\/\/doi.org\/10.1177\/0165551516677911","journal-title":"J Inf Sci"},{"key":"10433_CR71","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/5901087","author":"A Onan","year":"2019","unstructured":"Onan A (2019) Consensus clustering-based undersampling approach to imbalanced learning. Sci Program. https:\/\/doi.org\/10.1155\/2019\/5901087","journal-title":"Sci Program"},{"key":"10433_CR72","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-030-19807-7_29\/COVER","volume":"984","author":"A Onan","year":"2019","unstructured":"Onan A (2019b) Topic-enriched word embeddings for sarcasm identification. Adv Intell Syst Comput 984:293\u2013304. https:\/\/doi.org\/10.1007\/978-3-030-19807-7_29\/COVER","journal-title":"Adv Intell Syst Comput"},{"key":"10433_CR73","doi-asserted-by":"publisher","first-page":"145614","DOI":"10.1109\/ACCESS.2019.2945911","volume":"7","author":"A Onan","year":"2019","unstructured":"Onan A (2019c) Two-stage topic extraction model for bibliometric data analysis based on word embeddings and clustering. IEEE Access 7:145614\u2013145633. https:\/\/doi.org\/10.1109\/ACCESS.2019.2945911","journal-title":"IEEE Access"},{"issue":"1","key":"10433_CR74","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1002\/CAE.22179","volume":"28","author":"A Onan","year":"2020","unstructured":"Onan A (2020) Mining opinions from instructor evaluation reviews: a deep learning approach. Comput Appl Eng Educ 28(1):117\u2013138. https:\/\/doi.org\/10.1002\/CAE.22179","journal-title":"Comput Appl Eng Educ"},{"issue":"3","key":"10433_CR75","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1002\/CAE.22253","volume":"29","author":"A Onan","year":"2021","unstructured":"Onan A (2021a) Sentiment analysis on massive open online course evaluations: a text mining and deep learning approach. Comput Appl Eng Educ 29(3):572\u2013589. https:\/\/doi.org\/10.1002\/CAE.22253","journal-title":"Comput Appl Eng Educ"},{"issue":"23","key":"10433_CR76","doi-asserted-by":"publisher","first-page":"e5909","DOI":"10.1002\/CPE.5909","volume":"33","author":"A Onan","year":"2021","unstructured":"Onan A (2021) Sentiment analysis on product reviews based on weighted word embeddings and deep neural networks. Concurrency Comput 33(23):e5909. https:\/\/doi.org\/10.1002\/CPE.5909","journal-title":"Concurrency Comput"},{"issue":"5","key":"10433_CR77","doi-asserted-by":"publisher","first-page":"2098","DOI":"10.1016\/J.JKSUCI.2022.02.025","volume":"34","author":"A Onan","year":"2022","unstructured":"Onan A (2022) Bidirectional convolutional recurrent neural network architecture with group-wise enhancement mechanism for text sentiment classification. J King Saud University\u2014Comput Information Sci 34(5):2098\u20132117. https:\/\/doi.org\/10.1016\/J.JKSUCI.2022.02.025","journal-title":"J King Saud University\u2014Comput Information Sci"},{"issue":"1","key":"10433_CR78","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1177\/0165551515613226","volume":"43","author":"A Onan","year":"2017","unstructured":"Onan A, KorukoGlu S (2017) A feature selection model based on genetic rank aggregation for text sentiment classification. J Inf Sci 43(1):25\u201338. https:\/\/doi.org\/10.1177\/0165551515613226","journal-title":"J Inf Sci"},{"key":"10433_CR79","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/J.ESWA.2016.03.045","volume":"57","author":"A Onan","year":"2016","unstructured":"Onan A, Koruko\u01e7lu S, Bulut H (2016) Ensemble of keyword extraction methods and classifiers in text classification. Expert Syst Appl 57:232\u2013247. https:\/\/doi.org\/10.1016\/J.ESWA.2016.03.045","journal-title":"Expert Syst Appl"},{"issue":"4","key":"10433_CR80","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1016\/J.IPM.2017.02.008","volume":"53","author":"A Onan","year":"2017","unstructured":"Onan A, Koruko\u011flu S, Bulut H (2017) A hybrid ensemble pruning approach based on consensus clustering and multi-objective evolutionary algorithm for sentiment classification. Inform Processing Manag 53(4):814\u2013833. https:\/\/doi.org\/10.1016\/J.IPM.2017.02.008","journal-title":"Inform Processing Manag"},{"key":"10433_CR81","doi-asserted-by":"publisher","first-page":"7701","DOI":"10.1109\/ACCESS.2021.3049734","volume":"9","author":"A Onan","year":"2021","unstructured":"Onan A, Tocoglu MA (2021) A term weighted neural language model and stacked bidirectional LSTM Based framework for sarcasm identification. IEEE Access 9:7701\u20137722. https:\/\/doi.org\/10.1109\/ACCESS.2021.3049734","journal-title":"IEEE Access"},{"key":"10433_CR82","unstructured":"owasp. (2017). OWASP Top Ten. OWASP. https:\/\/owasp.org\/"},{"issue":"1","key":"10433_CR83","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/S13174-019-0115-X","volume":"10","author":"Y Pan","year":"2019","unstructured":"Pan Y, Sun F, Teng Z, White J, Schmidt DC, Staples J, Krause L (2019) Detecting web attacks with end-to-end deep learning. J Internet Serv Appl 10(1):1\u201322. https:\/\/doi.org\/10.1186\/S13174-019-0115-X","journal-title":"J Internet Serv Appl"},{"key":"10433_CR84","doi-asserted-by":"publisher","DOI":"10.1016\/J.MATPR.2021.07.178","author":"P Pavan Kumar","year":"2021","unstructured":"Pavan Kumar P, Jaya T, Rajendran V (2021) SI-BBA\u2014a novel phishing website detection based on swarm intelligence with deep learning. Mater Today. https:\/\/doi.org\/10.1016\/J.MATPR.2021.07.178","journal-title":"Mater Today"},{"key":"10433_CR85","doi-asserted-by":"publisher","first-page":"100199","DOI":"10.1016\/J.COSREV.2019.100199","volume":"34","author":"N Pitropakis","year":"2019","unstructured":"Pitropakis N, Panaousis E, Giannetsos T, Anastasiadis E, Loukas G (2019) A taxonomy and survey of attacks against machine learning. Comput Sci Rev 34:100199. https:\/\/doi.org\/10.1016\/J.COSREV.2019.100199","journal-title":"Comput Sci Rev"},{"issue":"2","key":"10433_CR86","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/S11277-020-07608-4","volume":"115","author":"JJ Praise","year":"2020","unstructured":"Praise JJ, Raj RJS, Benifa JVB (2020) Development of reinforcement learning and pattern matching (RLPM) based firewall for secured cloud infrastructure. Wireless Personal Commun 115(2):993\u20131018. https:\/\/doi.org\/10.1007\/S11277-020-07608-4","journal-title":"Wireless Personal Commun"},{"issue":"4","key":"10433_CR87","doi-asserted-by":"publisher","first-page":"1014","DOI":"10.3745\/JIPS.03.0079","volume":"13","author":"S Rathore","year":"2017","unstructured":"Rathore S, Sharma PK, Park JH (2017) XSSClassifier: an efficient XSS attack detection approach based on machine learning classifier on SNSs. J Inform Processing Syst 13(4):1014\u20131028. https:\/\/doi.org\/10.3745\/JIPS.03.0079","journal-title":"J Inform Processing Syst"},{"key":"10433_CR88","doi-asserted-by":"publisher","first-page":"106960","DOI":"10.1016\/J.COMNET.2019.106960","volume":"166","author":"GE Rodr\u00edguez","year":"2020","unstructured":"Rodr\u00edguez GE, Torres JG, Flores P, Benavides DE (2020) Cross-site scripting (XSS) attacks and mitigation: a survey. Computer Networks 166:106960. https:\/\/doi.org\/10.1016\/J.COMNET.2019.106960","journal-title":"Computer Networks"},{"key":"10433_CR89","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/J.JNCA.2018.06.004","volume":"118","author":"U Sarmah","year":"2018","unstructured":"Sarmah U, Bhattacharyya DK, Kalita JK (2018) A survey of detection methods for XSS attacks. J Netw Comput Appl 118:113\u2013143. https:\/\/doi.org\/10.1016\/J.JNCA.2018.06.004","journal-title":"J Netw Comput Appl"},{"key":"10433_CR90","unstructured":"Screencastify Chrome extension flaws allow webcam hijacks. (n.d.). https:\/\/www.bleepingcomputer.com\/news\/security\/screencastify-chrome-extension-flaws-allow-webcam-hijacks\/. Accessed 10 Oct 2022"},{"key":"10433_CR91","doi-asserted-by":"publisher","unstructured":"Shabut, A. M., Lwin, K. T., & Hossain, M. A. (2016). Cyber attacks, countermeasures, and protection schemes\u2014a state of the art survey. 2016 10th International Conference on Software, Knowledge, Information Management & Applications (SKIMA). https:\/\/doi.org\/10.1109\/SKIMA.2016.7916194","DOI":"10.1109\/SKIMA.2016.7916194"},{"key":"10433_CR92","doi-asserted-by":"publisher","first-page":"1526","DOI":"10.1109\/GLOCOMW.2012.6477812","volume":"2012","author":"N Shahid","year":"2012","unstructured":"Shahid N, Aleem SA, Naqvi IH, Zaffar N (2012) Support vector machine based fault detection & classification in smart grids. 2012 IEEE Globecom Workshops. GC Wkshps 2012:1526\u20131531. https:\/\/doi.org\/10.1109\/GLOCOMW.2012.6477812","journal-title":"GC Wkshps"},{"key":"10433_CR93","doi-asserted-by":"crossref","unstructured":"Machine Learning based Intrusion Detection System for Web-Based Attacks, Proceedings - 2020 IEEE 6th Intl Conference on Big Data Security on Cloud, BigDataSecurity 2020, 2020 IEEE Intl Conference on High Performance and Smart Computing, HPSC 2020 and 2020 IEEE Intl Conference on Intelligent Data and Security, IDS 2020 227 (2020).","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00048"},{"key":"10433_CR94","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-642-14344-1_14","volume":"307","author":"A Shukla","year":"2010","unstructured":"Shukla A, Tiwari R, Kala R (2010) Modular neural networks. Stud Comput Intell 307:307\u2013335. https:\/\/doi.org\/10.1007\/978-3-642-14344-1_14","journal-title":"Stud Comput Intell"},{"key":"10433_CR95","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100371","author":"M Snehi","year":"2021","unstructured":"Snehi M, Bhandari A (2021) Vulnerability retrospection of security solutions for software-defined cyber-physical system against DDoS and IoT-DDoS attacks. Comput Sci Rev. https:\/\/doi.org\/10.1016\/j.cosrev.2021.100371","journal-title":"Comput Sci Rev"},{"key":"10433_CR96","doi-asserted-by":"publisher","unstructured":"Syarif, A. R., & Gata, W. (2018). Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm. Proceedings of the 11th International Conference on Information and Communication Technology and System, ICTS 2017, 2018-January, 181\u2013186. https:\/\/doi.org\/10.1109\/ICTS.2017.8265667","DOI":"10.1109\/ICTS.2017.8265667"},{"key":"10433_CR97","doi-asserted-by":"publisher","first-page":"114386","DOI":"10.1016\/J.ESWA.2020.114386","volume":"168","author":"I Tariq","year":"2021","unstructured":"Tariq I, Sindhu MA, Abbasi RA, Khattak AS, Maqbool O, Siddiqui GF (2021) Resolving cross-site scripting attacks through genetic algorithm and reinforcement learning. Exp Syst Appl 168:114386. https:\/\/doi.org\/10.1016\/J.ESWA.2020.114386","journal-title":"Exp Syst Appl"},{"key":"10433_CR98","doi-asserted-by":"publisher","first-page":"100367","DOI":"10.1016\/J.COSREV.2021.100367","volume":"40","author":"G Tekli","year":"2021","unstructured":"Tekli G (2021) A survey on semi-structured web data manipulations by non-expert users. Comput Sci Rev 40:100367. https:\/\/doi.org\/10.1016\/J.COSREV.2021.100367","journal-title":"Comput Sci Rev"},{"issue":"1","key":"10433_CR99","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/S10462-021-10037-9","volume":"55","author":"A Thakkar","year":"2021","unstructured":"Thakkar A, Lohiya R (2021) A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions. Artificial Intell Rev 55(1):453\u2013563. https:\/\/doi.org\/10.1007\/S10462-021-10037-9","journal-title":"Artificial Intell Rev"},{"issue":"3","key":"10433_CR100","doi-asserted-by":"publisher","first-page":"1963","DOI":"10.1109\/TII.2019.2938778","volume":"16","author":"Z Tian","year":"2020","unstructured":"Tian Z, Luo C, Qiu J, Du X, Guizani M (2020) A distributed deep learning system for web attack detection on edge devices. IEEE Trans Industr Inf 16(3):1963\u20131971. https:\/\/doi.org\/10.1109\/TII.2019.2938778","journal-title":"IEEE Trans Industr Inf"},{"issue":"4","key":"10433_CR101","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3092695","volume":"50","author":"NK Tran","year":"2017","unstructured":"Tran NK, Sheng QZ, Babar MA, Yao L (2017) Searching the web of things: state of the art, challenges, and solutions. ACM Comput Surv 50(4):1\u201334. https:\/\/doi.org\/10.1145\/3092695","journal-title":"ACM Comput Surv"},{"key":"10433_CR102","doi-asserted-by":"publisher","first-page":"3","DOI":"10.3233\/JIFS-169424","volume":"34","author":"R Vinayakumar","year":"2018","unstructured":"Vinayakumar R, Soman KP, Poornachandran P, Sachin Kumar S (2018) Detecting android malware using long short-term memory (LSTM). J Intell Fuzzy Syst 34:3. https:\/\/doi.org\/10.3233\/JIFS-169424","journal-title":"J Intell Fuzzy Syst"},{"key":"10433_CR103","doi-asserted-by":"publisher","unstructured":"Vollmer, T., & Manic, M. (2009). Computationally efficient neural network intrusion security awareness. Proceedings - ISRCS 2009\u20142nd International Symposium on Resilient Control Systems, 25\u201330. https:\/\/doi.org\/10.1109\/ISRCS.2009.5251357","DOI":"10.1109\/ISRCS.2009.5251357"},{"key":"10433_CR104","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R von Solms","year":"2013","unstructured":"von Solms R, van Niekerk J (2013) From information security to cyber security. Comput Secur 38:97\u2013102. https:\/\/doi.org\/10.1016\/j.cose.2013.04.004","journal-title":"Comput Secur"},{"key":"10433_CR105","doi-asserted-by":"publisher","unstructured":"Vuong, T. P., Loukas, G., Gan, D., & Bezemskij, A. (2015). Decision tree-based detection of denial of service and command injection attacks on robotic vehicles. 2015 IEEE International Workshop on Information Forensics and Security, WIFS 2015 - Proceedings. https:\/\/doi.org\/10.1109\/WIFS.2015.7368559","DOI":"10.1109\/WIFS.2015.7368559"},{"key":"10433_CR106","doi-asserted-by":"publisher","first-page":"102554","DOI":"10.1016\/J.COSE.2021.102554","volume":"113","author":"Q Wang","year":"2022","unstructured":"Wang Q, Yang H, Wu G, Choo KKR, Zhang Z, Miao G, Ren Y (2022) Black-box adversarial attacks on XSS attack detection model. Comput Secur 113:102554. https:\/\/doi.org\/10.1016\/J.COSE.2021.102554","journal-title":"Comput Secur"},{"key":"10433_CR107","doi-asserted-by":"publisher","unstructured":"Wang, R., Jia, X., Li, Q., & Zhang, D. (2015). Improved N-gram approach for cross-site scripting detection in Online Social Network. Proceedings of the 2015 Science and Information Conference, SAI 2015, 1206\u20131212. https:\/\/doi.org\/10.1109\/SAI.2015.7237298","DOI":"10.1109\/SAI.2015.7237298"},{"key":"10433_CR108","doi-asserted-by":"publisher","unstructured":"Wang, R., Jia, X., Li, Q., & Zhang, S. (2014). Machine Learning Based Cross-Site Scripting Detection in Online Social Network. 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 823\u2013826. https:\/\/doi.org\/10.1109\/HPCC.2014.137","DOI":"10.1109\/HPCC.2014.137"},{"key":"10433_CR109","doi-asserted-by":"publisher","first-page":"102542","DOI":"10.1016\/J.COSE.2021.102542","volume":"113","author":"Z Wang","year":"2022","unstructured":"Wang Z, Fok KW, Thing VLL (2022) Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study. Comput Secur 113:102542. https:\/\/doi.org\/10.1016\/J.COSE.2021.102542","journal-title":"Comput Secur"},{"key":"10433_CR110","unstructured":"Wikipedia. (2021). Session ID. Online. https:\/\/en.wikipedia.org\/wiki\/Session_ID"},{"key":"10433_CR111","unstructured":"WordPress Stored XSS Vulnerability\u2014Update Now. (n.d.). https:\/\/www.searchenginejournal.com\/wordpress-core-vulnerability-2022\/441795\/#close. Accessed 10 Oct 2022"},{"key":"10433_CR112","unstructured":"XSS in Gmail\u2019s AMP For Email earns researcher $5,000 | The Daily Swig. (n.d.). https:\/\/portswigger.net\/daily-swig\/xss-in-gmails-amp-for-email-earns-researcher-5-000. Accessed 8 Oct 2022"},{"key":"10433_CR113","unstructured":"XSS vulnerabilities in Google Cloud, Google Play could lead to account hijacks | The Daily Swig. (n.d.). https:\/\/portswigger.net\/daily-swig\/xss-vulnerabilities-in-google-cloud-google-play-could-lead-to-account-hijacks. Accessed 8 Oct 2022"},{"key":"10433_CR114","unstructured":"XSSed | Cross Site Scripting (XSS) attacks information and archive. (n.d.). http:\/\/xssed.com\/. Accessed 2 Nov 2021"},{"key":"10433_CR115","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/J.JSS.2017.11.001","volume":"137","author":"R Yan","year":"2018","unstructured":"Yan R, Xiao X, Hu G, Peng S, Jiang Y (2018) New deep learning method to detect code injection attacks on hybrid applications. J Syst Softw 137:67\u201377. https:\/\/doi.org\/10.1016\/J.JSS.2017.11.001","journal-title":"J Syst Softw"},{"issue":"7","key":"10433_CR116","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1162\/NECO_A_01199","volume":"31","author":"Y Yu","year":"2019","unstructured":"Yu Y, Si X, Hu C, Zhang J (2019) A review of recurrent neural networks: Lstm cells and network architectures. Neural Comput 31(7):1235\u20131270. https:\/\/doi.org\/10.1162\/NECO_A_01199","journal-title":"Neural Comput"},{"key":"10433_CR117","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S10462-021-10123-Y","volume":"2021","author":"G Zhang","year":"2022","unstructured":"Zhang G, Liu B, Zhu T, Zhou A, Zhou W (2022) Visual privacy attacks and defenses in deep learning: a survey. Artif Intell Rev 2021:1\u201355. https:\/\/doi.org\/10.1007\/S10462-021-10123-Y","journal-title":"Artif Intell Rev"},{"key":"10433_CR118","doi-asserted-by":"publisher","first-page":"10989","DOI":"10.1109\/ACCESS.2020.2965184","volume":"8","author":"X Zhang","year":"2020","unstructured":"Zhang X, Zhou Y, Pei S, Zhuge J, Chen J (2020) Adversarial examples detection for XSS attacks based on generative adversarial networks. IEEE Access 8:10989\u201310996. https:\/\/doi.org\/10.1109\/ACCESS.2020.2965184","journal-title":"IEEE Access"},{"key":"10433_CR119","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-09976-0","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Ning H, Shi F, Farha F, Xu Y, Xu J, Zhang F, Choo KKR (2021a) Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif Intell Rev. https:\/\/doi.org\/10.1007\/s10462-021-09976-0","journal-title":"Artif Intell Rev"},{"issue":"2","key":"10433_CR120","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1007\/S10462-021-09976-0","volume":"55","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Ning H, Shi F, Farha F, Xu Y, Xu J, Zhang F, Choo KKR (2021) Artificial intelligence in cyber security: research advances, challenges, and opportunities. Artif Intell Rev 55(2):1029\u20131053. https:\/\/doi.org\/10.1007\/S10462-021-09976-0","journal-title":"Artif Intell Rev"},{"key":"10433_CR121","doi-asserted-by":"publisher","unstructured":"Zhao, G., Zhang, C., & Zheng, L. (2017, July). Intrusion Detection Using Deep Belief Network and Probabilistic Neural Network. 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). https:\/\/doi.org\/10.1109\/CSE-EUC.2017.119","DOI":"10.1109\/CSE-EUC.2017.119"},{"key":"10433_CR122","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/J.COSE.2018.12.016","volume":"82","author":"Y Zhou","year":"2019","unstructured":"Zhou Y, Wang P (2019) An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence. Comput Secur 82:261\u2013269. https:\/\/doi.org\/10.1016\/J.COSE.2018.12.016","journal-title":"Comput Secur"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-023-10433-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-023-10433-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-023-10433-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T21:36:06Z","timestamp":1729114566000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-023-10433-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,23]]},"references-count":123,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["10433"],"URL":"https:\/\/doi.org\/10.1007\/s10462-023-10433-3","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,23]]},"assertion":[{"value":"23 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}