咨询与建议

限定检索结果

文献类型

  • 13 篇 会议
  • 10 篇 期刊文献

馆藏范围

  • 23 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 21 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 23 篇 malicious javasc...
  • 5 篇 web security
  • 5 篇 machine learning
  • 3 篇 deep learning
  • 3 篇 code obfuscation
  • 3 篇 malware detectio...
  • 2 篇 ast
  • 1 篇 graph neural net...
  • 1 篇 intrusion detect...
  • 1 篇 k-nn
  • 1 篇 document instrum...
  • 1 篇 javascript code ...
  • 1 篇 client-side web ...
  • 1 篇 ensemble learnin...
  • 1 篇 control flow gra...
  • 1 篇 web 2.0
  • 1 篇 extension
  • 1 篇 code representat...
  • 1 篇 phishing attacks
  • 1 篇 information flow...

机构

  • 2 篇 cispa helmholtz ...
  • 1 篇 deakin univ sch ...
  • 1 篇 naif arab univ s...
  • 1 篇 univ calif river...
  • 1 篇 kitri best best ...
  • 1 篇 bits pilani dept...
  • 1 篇 chinese acad sci...
  • 1 篇 zhejiang univ te...
  • 1 篇 heinrich heine u...
  • 1 篇 nile univ giza
  • 1 篇 minist publ secu...
  • 1 篇 bits pilani dept...
  • 1 篇 syracuse univ de...
  • 1 篇 natl inst techno...
  • 1 篇 zhejiang univ te...
  • 1 篇 sichuan univ sch...
  • 1 篇 jinyinhu lab peo...
  • 1 篇 suny binghamton ...
  • 1 篇 natl cent univ d...
  • 1 篇 univ chinese aca...

作者

  • 2 篇 fass aurore
  • 2 篇 backes michael
  • 2 篇 stock ben
  • 2 篇 singh a. k.
  • 1 篇 huang cheng
  • 1 篇 kim kyounggon
  • 1 篇 yang sen
  • 1 篇 hong geng
  • 1 篇 nadkarni tanusha...
  • 1 篇 al-salman rami
  • 1 篇 jiang lin
  • 1 篇 zhang weihui
  • 1 篇 zeng minchuan
  • 1 篇 zhang lei
  • 1 篇 singh sarabjot
  • 1 篇 wu yueming
  • 1 篇 shosha ahmed
  • 1 篇 oh suhyeon
  • 1 篇 hong jiwon
  • 1 篇 conrad stefan

语言

  • 22 篇 英文
  • 1 篇 其他
检索条件"主题词=Malicious JavaScript"
23 条 记 录,以下是11-20 订阅
Detecting malicious javascript in PDF through Document Instrumentation  44
Detecting Malicious Javascript in PDF through Document Instr...
收藏 引用
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
作者: Liu, Daiping Wang, Haining Stavrou, Angelos Coll William & Mary Dept Comp Sci Williamsburg VA 23187 USA George Mason Univ Ctr Secure Informat Syst Fairfax VA 22030 USA
An emerging threat vector, embedded malware inside popular document formats, has become rampant since 2008. Owed to its wide-spread use and javascript support, PDF has been the primary vehicle for delivering embedded ... 详细信息
来源: 评论
Detection and Mitigation Of malicious javascript Using Information Flow Control  12
Detection and Mitigation Of Malicious JavaScript Using Infor...
收藏 引用
12th Annual International Conference on Privacy, Security and Trust (PST)
作者: Sayed, Bassam Traore, Issa Abdelhalim, Amany Univ Victoria Dept Elect & Comp Engn Victoria BC Canada
javascript is the main language used to provide the client-side functionality of the modern web. It is used in many applications that provide high interactivity with the end-user. These applications range from mapping... 详细信息
来源: 评论
Combating phishing and script-based attacks: a novel machine learning framework for improved client-side security
收藏 引用
JOURNAL OF SUPERCOMPUTING 2025年 第1期81卷 1-24页
作者: Hong, Jiwon Kim, Hyeongmin Oh, Suhyeon Im, Yerin Jeong, Hyeonseong Kim, Hyunmin Jang, Eunkueng Kim, Kyounggon KITRI Best Best Program Seoul 08378 South Korea Financial Secur Inst 132 Daeji ro Yongin 16881 Gyeonggi Do South Korea Univ Sunderland Comp Sci Cybersecur Chester Rd Sunderland SR1 3SD England Naif Arab Univ Secur Sci Ctr Excellence Cybercrimes & Digital Forens Riyadh 11452 Saudi Arabia
Given the rising challenge of client-based web attacks through vulnerabilities in websites, traditional pattern detection methods often fall short in identifying emerging threats. To bridge this gap, our study propose... 详细信息
来源: 评论
Understanding and Mitigating Threats from Android Hybrid Apps Using Machine Learning  8
Understanding and Mitigating Threats from Android Hybrid App...
收藏 引用
8th IEEE International Conference on Big Data (Big Data)
作者: Singh, A. K. Goyal, Navneet BITS Pilani Dept CSIS Pilani Campus Pilani Rajasthan India
The Android platform has emerged as the most popular computing platform that has more than 2.5 billion devices [1] working across the globe. These devices include not only mobiles and tablets, but even Android Auto mo... 详细信息
来源: 评论
Analysis and Identification of malicious javascript Code
收藏 引用
INFORMATION SECURITY JOURNAL 2012年 第1期21卷 1-11页
作者: Fraiwan, Mohammad Al-Salman, Rami Khasawneh, Natheer Conrad, Stefan Jordan Univ Sci & Technol Dept Comp Engn POB 3030 Irbid Jordan Jordan Univ Sci & Technol Dept Software Engn Irbid Jordan Heinrich Heine Univ Inst Comp Sci Dusseldorf Germany
malicious javascript code has been actively and recently utilized as a vehicle for Web-based security attacks. By exploiting vulnerabilities such as cross-site scripting (XSS), attackers are able to spread worms, cond... 详细信息
来源: 评论
A Cloud-based Protection approach against javascript-based attacks to browsers
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2018年 68卷 241-251页
作者: Hsu, Fu-Hau Hwang, Yan-Ling Lee, Chia-Hao Lin, Chieh-Ju Chang, KaiWei Huang, Chen-Chia Natl Cent Univ Dept Comp Sci & Informat Engn Taoyuan 32001 Taiwan Chung Shan Med Univ Sch Appl Foreign Languages Taichung 40201 Taiwan
javascript is a standard of client-side scripting languages. Due to its cross-platform property, javascript is widely used in web pages. Hence its security problems can seriously influence the security of devices exec... 详细信息
来源: 评论
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World  18
How You Get Shot in the Back: A Systematical Study about Cry...
收藏 引用
ACM SIGSAC Conference on Computer and Communications Security (CCS)
作者: Hong, Geng Yang, Zhemin Yang, Sen Zhang, Lei Nan, Yuhong Zhang, Zhibo Yang, Min Zhang, Yuan Qian, Zhiyun Duan, Haixin Fudan Univ Shanghai Peoples R China Univ Calif Riverside Riverside CA 92521 USA Tsinghua Univ Beijing Peoples R China
As a new mechanism to monetize web content, cryptocurrency mining is becoming increasingly popular. The idea is simple: a webpage delivers extra workload (javascript) that consumes computational resources on the clien... 详细信息
来源: 评论
malicious and Benign Webpages Dataset
收藏 引用
DATA IN BRIEF 2020年 32卷 106304页
作者: Singh, A. K. BITS Pilani Dept Comp Sci & Informat Syst Adv Data Analyt & Parallel Technol Lab Pilani Campus Pilani Rajasthan India
Web Security is a challenging task amidst ever rising threats on the Internet. With billions of websites active on Internet, and hackers evolving newer techniques to trap web users, machine learning offers promising t... 详细信息
来源: 评论
Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art
收藏 引用
INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT 2017年 第1期8卷 512-530页
作者: Gupta, Shashank Gupta, B. B. Natl Inst Technol Kurukshetra Kurukshetra Haryana India
Nowadays, web applications are becoming one of the standard platforms for representing data and service releases over the World Wide Web. Since web applications are progressively more utilized for security-critical se... 详细信息
来源: 评论
FEPDF: A Robust Feature Extractor for malicious PDF Detection  16
FEPDF: A Robust Feature Extractor for Malicious PDF Detectio...
收藏 引用
16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications / The 11th IEEE International Conference on Big Data Science and Engineering / The 14th IEEE International Conference on Embedded Software and Systems
作者: Li, Min Liu, Yunzheng Yu, Min Li, Gang Wang, Yongjian Liu, Chao Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China Deakin Univ Sch Informat Technol Geelong Vic Australia Minist Publ Secur Res Inst 3 Key Lab Informat Network Secur Shanghai Peoples R China
Due to rich characteristics and functionalities, PDF format has become the de facto standard for the electronic document exchange. As vulnerabilities in the major PDF viewers have been disclosed, a number of methods h... 详细信息
来源: 评论