{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:49:31Z","timestamp":1774540171465,"version":"3.50.1"},"reference-count":34,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.054780","type":"journal-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T02:38:47Z","timestamp":1727145527000},"page":"707-748","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":6,"title":["Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting (XSS) Attack Detection"],"prefix":"10.32604","volume":"81","author":[{"given":"Noor Ullah","family":"Bacha","sequence":"first","affiliation":[]},{"given":"Songfeng","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Attiq Ur","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Idrees","sequence":"additional","affiliation":[]},{"given":"Yazeed Yasin","family":"Ghadi","sequence":"additional","affiliation":[]},{"given":"Tahani Jaser","family":"Alahmadi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","article-title":"Vulnerability retrospection of security solutions for software-defined cyber-physical system against DDoS and IoT-DDoS attacks","volume":"40","author":"Snehi","year":"May 1, 2021, Art. no. 100371","journal-title":"Comput. Sci. Rev."},{"key":"ref2","article-title":"Resolving cross-site scripting attacks through genetic algorithm and reinforcement learning","volume":"168","author":"Tariq","year":"Apr. 15, 2021, Art. no. 114386","journal-title":"Expert. Syst. Appl."},{"key":"ref3","article-title":"An efficient artificial intelligence approach for early detection of cross-site scripting attacks","volume":"11","author":"Younas","year":"2024, Art. no. 100466","journal-title":"Decis. Anal. J."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"808","DOI":"10.1093\/comjnl\/bxt133","article-title":"Detection of cross-site scripting attack under multiple scenarios","volume":"58","author":"Das","year":"Sep. 2015","journal-title":"Comput. J."},{"key":"ref5","article-title":"Cross channel scripting and code injection attacks on web and cloud-based applications: A comprehensive review","volume":"22","author":"Indushree","year":"Mar. 2022, Art. no. 1959","journal-title":"Sensors"},{"key":"ref6","article-title":"Cost-effective detection system of cross-site scripting attacks using hybrid learning approach","volume":"19","author":"Al-Haija","year":"Sep. 1, 2023, Art. no. 101266","journal-title":"Results Eng."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.jnca.2018.06.004","article-title":"A survey of detection methods for XSS attacks","volume":"118","author":"Sarmah","year":"Sep. 2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref8","first-page":"22","article-title":"A framework to mitigate attacks in web applications","volume":"15","author":"Bin Sulaiman","year":"Jan. 1, 2021","journal-title":"IUP J. Comput. Sci."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"12725","DOI":"10.1007\/s10462-023-10433-3","article-title":"Detection of cross-site scripting (XSS) attacks using machine learning techniques: A review","volume":"56","author":"Kaur","year":"Mar. 23, 2023","journal-title":"Artif. Intell. Rev."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.jpdc.2017.07.006","article-title":"TT-XSS: A novel taint tracking based dynamic detection framework for DOM cross-site scripting","volume":"118","author":"Wang","year":"Aug. 1, 2018","journal-title":"J. Parallel Distr. Comput."},{"key":"ref11","series-title":"2014 IEEE Int. Conf. High Perform. Comput. Commun., 2014 IEEE 6th Int. Symp. Cyberspace Safety and Secur., 2014 IEEE 11th Int. Conf. Embedded Softw. Syst. (HPCC,CSS,ICESS)","first-page":"823","article-title":"Machine learning based cross-site scripting detection in online social network","author":"Wang","year":"Aug. 20, 2014"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"100567","DOI":"10.1109\/ACCESS.2019.2927417","article-title":"MLPXSS: An integrated XSS-based attack detection scheme in web applications using multilayer perceptron technique","volume":"7","author":"Mokbal","year":"Jul. 8, 2019","journal-title":"IEEE Access"},{"key":"ref13","series-title":"2022 Int. Conf. Comput. Commun. Inform. (ICCCI)","first-page":"1","article-title":"Cross site scripting attacks classification using convolutional neural network","author":"Kumar","year":"Jan. 25\u201327, 2022"},{"key":"ref14","series-title":"2021 Int. Conf. Data Anal. Bus. Indust. (ICDABI)","first-page":"644","article-title":"URL-based phishing websites detection via machine learning","author":"Al-Haija","year":"Dec. 29, 2021"},{"key":"ref15","series-title":"2020 Glob. Smart Ind. Conf. (GloSIC)","first-page":"265","article-title":"The detecting cross-site scripting (XSS) using machine learning methods","author":"Kascheev","year":"Nov. 17\u201319, 2020"},{"key":"ref16","article-title":"Cross-site scripting guardian: A static XSS detector based on data stream input-output association mining","volume":"10","author":"Li","year":"Jul. 2020, Art. no. 4740","journal-title":"Appl. Sci."},{"key":"ref17","series-title":"Proc. 2018 Int. Conf. Comput. Artif. Intell.","first-page":"47","article-title":"DeepXSS: Cross site scripting detection based on deep learning","volume":"18","author":"Fang","year":"Mar. 12, 2018"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"10989","DOI":"10.1109\/ACCESS.2020.2965184","article-title":"Adversarial examples detection for XSS attacks based on generative adversarial networks","volume":"8","author":"Zhang","year":"Jan. 9, 2020","journal-title":"IEEE Access"},{"key":"ref19","article-title":"XGBXSS: An extreme gradient boosting detection framework for cross-site scripting attacks based on hybrid feature selection approach and parameters optimization","volume":"58","author":"Mokbal","year":"May 2021, Art. no. 102813","journal-title":"J. Inf. Secur. Appl."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1016\/j.dcan.2022.09.024","article-title":"Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach","volume":"10","author":"Krishnan","year":"Jun. 2024","journal-title":"Digit. Commun. Netw."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/j.cose.2018.12.016","article-title":"An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence","volume":"82","author":"Zhou","year":"May 1, 2019","journal-title":"Comput. Secur."},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102597","article-title":"GraphXSS: An efficient XSS payload detection approach based on graph convolutional network","volume":"114","author":"Liu","year":"Mar. 2022, Art. no. 102597","journal-title":"Comput. Secur."},{"key":"ref23","series-title":"2018 IEEE Int. Conf. Intell. Secur. Inform. (ISI)","first-page":"220","article-title":"PhishMon: A machine learning framework for detecting phishing webpages","author":"Niakanlahiji","year":"Nov. 09\u201311, 2018"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.procs.2018.03.053","article-title":"Detecting phishing websites via aggregation analysis of page layouts","volume":"129","author":"Mao","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"ref25","doi-asserted-by":"crossref","first-page":"36805","DOI":"10.1109\/ACCESS.2023.3252366","article-title":"Phishing detection system through hybrid machine learning based on URL","volume":"11","author":"Karim","year":"Mar. 3, 2023","journal-title":"IEEE Access"},{"key":"ref26","article-title":"HTTP header based phishing attack detection using machine learning","volume":"35","author":"Shukla","year":"Sep. 29, 2024, Art. no. 4872","journal-title":"Trans. Emerg. Telecomm. Technol."},{"key":"ref27","article-title":"Securing heterogeneous embedded devices against XSS attack in intelligent IoT system","volume":"118","author":"Chaudhary","year":"Jul. 2022, Art. no. 102710","journal-title":"Comput. Secur."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"4593","DOI":"10.1007\/s00500-022-07697-2","article-title":"Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology","volume":"27","author":"Chaudhary","year":"Dec. 8, 2022","journal-title":"Soft Comput."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/TNET.2021.3137084","article-title":"Adversarial attacks against deep learning-based network intrusion detection systems and defense mechanisms","volume":"30","author":"Zhang","year":"Jun. 2022","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref30","series-title":"Proc. 2019 11th Int. Conf. Mach. Learn. Comput.","first-page":"477","article-title":"CNNPayl: An intrusion detection system of cross-site script detection","author":"Zhang","year":"2019"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2021.104509","article-title":"Dynamic feature weighting for data streams with distribution-based log-likelihood divergence","volume":"107","author":"Wang","year":"Jan. 2022, Art. no. 104509","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref32","article-title":"Network intrusion detection: An optimized deep learning approach using big data analytics","volume":"251","author":"Mary","year":"2024, Art. no. 123919","journal-title":"Expert. Syst. Appl."},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103749","article-title":"Few-shot graph classification on cross-site scripting attacks detection","volume":"140","author":"Pan","year":"May 2024, Art. no. 103749","journal-title":"Comput. Secur."},{"key":"ref34","article-title":"ZTWeb: Cross site scripting detection based on zero trust","volume":"134","author":"Wu","year":"Nov. 2023, Art. no. 103434","journal-title":"Comput. Secur."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_54780\/TSP_CMC_54780.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:34:49Z","timestamp":1741314889000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58320"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":34,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.054780","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-06-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-14","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}