Search Results - "JavaScript attack"
-
1
Authors: et al.
Source: 2016 IEEE Symposium on Security and Privacy (SP)
-
2
Authors: et al.
Source: International Journal of Information Security. Jun2018, Vol. 17 Issue 3, p291-313. 23p.
Subject Terms: *PERSONAL identification numbers, *JAVASCRIPT programming language, *SMARTPHONES, *ARTIFICIAL neural networks
Reviews & Products: ANDROID (Operating system)
-
3
Authors: et al.
Source: Journal of Information Security & Applications. Feb2016, Vol. 26, p23-38. 16p.
Subject Terms: *JAVASCRIPT programming language, *WEBSITES, *PERSONAL identification numbers, *ACQUISITION of data
Reviews & Products: IOS (Operating system)
-
4
-
5
-
6
Source: Software World; May2008, Vol. 39 Issue 3, p24-25, 2p
Subject Terms: COMPUTER software
Company/Entity: WEBSENSE Inc.
-
7
Authors:
Source: Information Computing & Automation (In 3 Volumes) - Proceedings of the International Conference; 2008, Issue 3, p1263-1265, 3p
Subject Terms: AJAX (Web development technology), JSON (Document markup language), GENETIC algorithms, COMPUTER security, PROBLEM solving
-
8
Authors:
Source: Neural Network World; 2017, Issue 1, p5-25, 21p
Subject Terms: CLIENT/SERVER computing, ONLINE social networks, COMPUTER worms
-
9
Authors: Dunn, John E.
Source: CSO Magazine. Sep2011, Vol. 10 Issue 7, p14-14. 1/3p.
-
10
Authors:
Source: 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence). :860-865
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Access URL: http://eprints.bits-pilani.ac.in/2175/
-
11
Authors: et al.
Source: Lecture Notes in Computer Science ISBN: 9783031786754
Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2404.07042
-
12
-
13
Authors:
Source: International Journal of Performability Engineering. Dec2018, Vol. 14 Issue 12, p3167-3173. 7p.
-
14
Authors:
Source: Journal of Cybersecurity & Information Management; 2024, Vol. 13 Issue 2, p171-181, 11p
-
15
-
16
-
17
Authors: et al.
Source: Entropy; Jul2023, Vol. 25 Issue 7, p1099, 19p
Subject Terms: RANDOM forest algorithms, ENTROPY, SUPPORT vector machines, METADATA
-
18
Authors:
Source: Applied Sciences (2076-3417); Apr2023, Vol. 13 Issue 7, p4365, 11p
-
19
Authors: et al.
Source: Computer Systems Science & Engineering; 2023, Vol. 44 Issue 2, p1679-1689, 11p
Subject Terms: MACHINE learning, DATA analytics, CYBERTERRORISM, RECURRENT neural networks, FEATURE extraction
-
20
Authors:
Source: Journal of Intelligent & Fuzzy Systems; 2022, Vol. 43 Issue 3, p3429-3442, 14p
Subject Terms: FEATURE extraction, DEEP learning, MACHINE learning, RANDOM forest algorithms, MALWARE, WEBSITES
Nájsť tento článok vo Web of Science
Full Text Finder