Search Results - "JavaScript malware"
-
1
Authors: et al.
Source: Communications in Computer and Information Science ISBN: 9783031948541
Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2505.21406
-
2
Authors: et al.
Source: Knowledge and Information Systems. 66:1337-1370
-
3
Authors: Martin Johns
Source: J. Comput. Virol.. 4:161-178
-
4
Authors:
Source: IEEE Access, Vol 8, Pp 190539-190552 (2020)
Subject Terms: FOS: Computer and information sciences, JavaScript, Code Clone Detection, Cybersecurity, MEDLINE, FOS: Political science, Software Defect Prediction, FOS: Law, Epistemology, 02 engineering and technology, Malware, Detection and Prevention of Phishing Attacks, Data science, Characterization and Detection of Android Malware, Context (archaeology), Computer security, 0202 electrical engineering, electronic engineering, information engineering, Information retrieval, javascript attacks, Key (lock), Political science, Biology, Source Code Analysis, systematic literature review, Paleontology, Computer science, TK1-9971, FOS: Philosophy, ethics and religion, World Wide Web, Philosophy, Spam Detection, Signal Processing, Computer Science, Physical Sciences, Systematic review, Quality (philosophy), Security Analysis, javascript malware detection, Electrical engineering. Electronics. Nuclear engineering, malicious code detection, Law, Empirical Studies in Software Engineering, Information Systems
-
5
Authors: et al.
Source: 2022 IEEE Symposium on Security and Privacy (SP)
-
6
Authors:
Source: Proceedings of the 30th ACM International Conference on Information & Knowledge Management. :4165-4172
-
7
Authors:
Source: 2020 IEEE REGION 10 CONFERENCE (TENCON). :864-869
-
8
Authors: et al.
Source: Journal of Intelligent & Fuzzy Systems. 39:249-261
-
9
Authors:
Source: 2018 International Conference on Machine Learning and Cybernetics (ICMLC). :511-514
-
10
Authors: et al.
Subject Terms: Cryptography and Security
Relation: http://arxiv.org/abs/2505.21406
Availability: http://arxiv.org/abs/2505.21406
-
11
Authors: et al.
Source: 2016 11th International Conference on Malicious and Unwanted Software (MALWARE). :1-8
-
12
Authors: et al.
Source: 2016 IEEE Trustcom/BigDataSE/ISPA. :1734-1740
-
13
Authors: et al.
Source: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. :109-120
-
14
Authors: et al.
Contributors: et al.
Source: IFIP Advances in Information and Communication Technology ISBN: 9783030582005
Subject Terms: JavaScript, MLE@TUHH, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, [INFO] Computer Science [cs], LSH, Malware, Neural network
File Description: application/pdf
-
15
Authors:
Source: Proceedings of the 2014 ACM Southeast Regional Conference. :1-6
-
16
-
17
Authors:
Source: Journal of Computer Virology and Hacking Techniques. 11:89-102
-
18
Authors:
Source: 2025 International Conference on Artificial Intelligence and Innovative Applications (AIIA) ; page 1-6
-
19
Authors: et al.
Source: Proceedings of the International Conference on Promotion of Information Technology (ICPIT 2016).
-
20
Authors:
Source: Lecture Notes in Computer Science ISBN: 9783540736134
Nájsť tento článok vo Web of Science
Full Text Finder