咨询与建议

限定检索结果

文献类型

  • 13 篇 会议
  • 10 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 21 篇 计算机科学与技术...
    • 6 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 24 篇 malicious javasc...
  • 6 篇 machine learning
  • 5 篇 web security
  • 3 篇 deep learning
  • 3 篇 code obfuscation
  • 3 篇 malware detectio...
  • 2 篇 ast
  • 2 篇 malware
  • 1 篇 graph neural net...
  • 1 篇 intrusion detect...
  • 1 篇 k-nn
  • 1 篇 statická analýya
  • 1 篇 document instrum...
  • 1 篇 javascript code ...
  • 1 篇 client-side web ...
  • 1 篇 ensemble learnin...
  • 1 篇 control flow gra...
  • 1 篇 web 2.0
  • 1 篇 extension
  • 1 篇 code representat...

机构

  • 2 篇 cispa helmholtz ...
  • 1 篇 deakin univ sch ...
  • 1 篇 naif arab univ s...
  • 1 篇 univ calif river...
  • 1 篇 kitri best best ...
  • 1 篇 bits pilani dept...
  • 1 篇 chinese acad sci...
  • 1 篇 zhejiang univ te...
  • 1 篇 heinrich heine u...
  • 1 篇 nile univ giza
  • 1 篇 minist publ secu...
  • 1 篇 bits pilani dept...
  • 1 篇 syracuse univ de...
  • 1 篇 natl inst techno...
  • 1 篇 zhejiang univ te...
  • 1 篇 sichuan univ sch...
  • 1 篇 jinyinhu lab peo...
  • 1 篇 suny binghamton ...
  • 1 篇 natl cent univ d...
  • 1 篇 univ chinese aca...

作者

  • 2 篇 fass aurore
  • 2 篇 backes michael
  • 2 篇 stock ben
  • 2 篇 singh a. k.
  • 1 篇 huang cheng
  • 1 篇 kim kyounggon
  • 1 篇 yang sen
  • 1 篇 hong geng
  • 1 篇 nadkarni tanusha...
  • 1 篇 al-salman rami
  • 1 篇 jiang lin
  • 1 篇 zhang weihui
  • 1 篇 zeng minchuan
  • 1 篇 zhang lei
  • 1 篇 singh sarabjot
  • 1 篇 wu yueming
  • 1 篇 shosha ahmed
  • 1 篇 oh suhyeon
  • 1 篇 hong jiwon
  • 1 篇 conrad stefan

语言

  • 23 篇 英文
  • 1 篇 其他
检索条件"主题词=Malicious JavaScript"
24 条 记 录,以下是21-30 订阅
排序:
Semantics-Preserving Dissection of javascript Exploits via Dynamic JS-Binary Analysis  19th
收藏 引用
19th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID)
作者: Hu, Xunchao Prakash, Aravind Wang, Jinghan Zhou, Rundong Cheng, Yao Yin, Heng Syracuse Univ Dept EECS Syracuse NY 13210 USA SUNY Binghamton Dept Comp Sci Binghamton NY USA
javascript exploits impose a severe threat to computer security. Once a zero-day exploit is captured, it is critical to quickly pinpoint the javascript statements that uniquely characterize the exploit and the payload... 详细信息
来源: 评论
Ensemble Learning for Detection of malicious Content Embedded in PDF Documents
Ensemble Learning for Detection of Malicious Content Embedde...
收藏 引用
IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES)
作者: Nath, Hiran V. Mehtre, B. M. IDRBT CIAM Hyderabad Andhra Pradesh India Univ Hyderabad SCIS Hyderabad Andhra Pradesh India
Portable Document Format (PDF) is used as a defacto standard for sharing documents. Even though pdf is a document description language, it has lot of features similar to programming language. With the addon support of... 详细信息
来源: 评论
IFrandbox - Client Side Protection from malicious Injected Iframes
IFrandbox - Client Side Protection from Malicious Injected I...
收藏 引用
7th International Conference on Information Systems Security Conference (ICISS)
作者: Nadkarni, Tanusha S. Mohandas, Radhesh Pais, Alwyn R. Natl Inst Technol Karnataka Dept Comp Sci & Engn Informat Secur Res Lab Surathkal India
Drive-by downloads are currently one of the most popular methods of malware distribution. Widely visited legitimate websites are infused with invisible or barely visible Iframes pointing to malicious URLs, causing sil... 详细信息
来源: 评论
Detekce škodlivých webových stránek pomocí strojového učení
Detekce škodlivých webových stránek pomocí strojového ...
收藏 引用
作者: Šulák, Ladislav Brno University of Technology
Táto práca sa zaoberá problematikou škodlivého kódu na webe so zameraním na analýzu a detekciu škodlivého javascriptu umiestneného na strane klienta s využitím strojov... 详细信息
来源: 评论