References
- Wade Alcorn. Cross-site scripting viruses and worms a new attack vector. Network Security, 2006.
- Gayatri Sakya, Vidushi Sharma. (2019) Performance evaluation of ADMC-MAC mission critical protocol for wireless sensor networks. Journal of Discrete Mathematical Sciences and Cryptography 22:8, pages 1407-1422. doi: https://doi.org/10.1080/09720529.2019.1692448
- Ming Di, Shah Nazir, Fucheng Deng, Sikandar Ali. (2021) Influencing User’s Behavior Concerning Android Privacy Policy: An Overview. Mobile Information Systems 2021, pages 1-19. doi: https://doi.org/10.1155/2021/3452700
- Tiwari, A., Sharma, R. M., & Garg, R. (2020). Emerging ontology formulation of optimized internet of things (IOT) services with cloud computing. Soft Computing: Theories and Applications.
- Gupta, Y., Dewan, H., & Leekha, A. (2020). Real-time monitoring using AJAX and WebSockets. Journal of Statistics and Management Systems, 23(1), 125-134. doi: https://doi.org/10.1080/09720510.2020.1714154
- Tiwari, A., & Sharma, R. M. (2018). Realm Towards Service Optimization in Fog Computing. In Proceedings of the International Journal of Fog Computing (IJFC)” IGI Global.
- A.E. Nunan, E. Souto, and E. Feitosa. Automatic classification of cross-site scripting in web pages using document-based and URL- based features. In Computers and Communications (ISCC), 2012.
- Tiwari, A., Sah, M. K., & Gupta, S. (2015). Efficient Service Utilization in Cloud Computing Exploitation Victimization as Revised Rough Set Optimization Service Parameters. Procedia Computer Science, 610-617. doi: https://doi.org/10.1016/j.procs.2015.10.050
- R. Putthacharoen and P. Bunyatnoparat. Protecting cookies from cross site script attacks using dynamic cookies rewriting technique. In Advanced Communication Technology (ICACT), 2011.
- Lwin Khin Shar and Hee Beng Kuan Tan. Defending against cross- site scripting attacks. Computer, 45(3):55–62, 2012. doi: https://doi.org/10.1109/MC.2011.261
- Tiwari, A., & Sharma, R. M. (2019). Realm Towards Service Optimization in Fog Computing. International Journal of Fog Computing (IJFC), 2(2), 13-43. doi: https://doi.org/10.4018/IJFC.2019070102
- Bo Zhou and Xuming Pan. Cookie-based cdn security authorization design. In Internet Technology and Applications (iTAP), 2011.
- Tiwari, A., & Sharma, R. M. (2016, August). Potent cloud services utilization with efficient revised rough set optimization service parameters. In Proceedings of the International Conference on Advances in Information Communication Technology & Computing (pp. 1-7).
- Yi Wang, Zhoujun Li, and Tao Guo. Program slicing stored xss bugs in web application. In Theoretical Aspects of Software Engineering (TASE), 2011.
- Tiwari, A., & Sharma, R. M. (2021). OCC: A Hybrid Multiprocessing Computing Service Decision Making Using Ontology System. International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), 16(4), 96-116. doi: https://doi.org/10.4018/IJWLTT.20210701.oa6
- Saleem Riaz, Lin Hui, Mehmet Serif Aldemir, Farkhanda Afzal. (2021) A future concern of iterative learning control : A survey. Journal of Statistics and Management Systems 24:6, pages 1301-1322. doi: https://doi.org/10.1080/09720510.2020.1856421