Search Results - "Obfuscation JavaScript"
-
1
Authors: et al.
Contributors: et al.
Subject Terms: Malicious Web Sites, Obfuscation JavaScript, Entropy, Frequency, Density
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.7432; http://www.sersc.org/journals/IJAST/vol26/2.pdf
-
2
Authors:
Source: Electronics (2079-9292); Sep2025, Vol. 14 Issue 18, p3746, 39p
Subject Terms: PHISHING, CONVOLUTIONAL neural networks, INTERNET security, MACHINE learning, TRADEMARKS
-
3
Authors: et al.
Source: Electronics (2079-9292); Dec2024, Vol. 13 Issue 23, p4677, 34p
Subject Terms: TRANSFORMER models, MACHINE learning, MALWARE, DEEP learning, CYBERTERRORISM, RANSOMWARE
-
4
Authors:
Source: International Journal of Information Security; Apr2024, Vol. 23 Issue 2, p819-848, 30p
Subject Terms: PHISHING, ONLINE databases, PHISHING prevention, COVID-19 pandemic, TAXONOMY, COVID-19, SCIENCE publishing
-
5
Authors:
Source: Journal of Computer Virology & Hacking Techniques; Sep2023, Vol. 19 Issue 3, p387-398, 12p
-
6
Authors: et al.
Source: Security & Communication Networks; 5/2/2018, p1-16, 16p
Subject Terms: WEB browsers, JAVASCRIPT programming language, EXTENSIONS, FEATURE selection, SOURCE code
-
7
Authors:
Source: Information Security Journal: A Global Perspective; 2018, Vol. 27 Issue 3, p145-161, 17p
-
8
Authors: et al.
Source: Information Security & Cryptology - ICISC 2015; 2016, p278-293, 16p
-
9
Authors:
Source: 2015 The International Symposium on Artificial Intelligence & Signal Processing (AISP); 2015, p322-327, 6p
-
10
Authors:
Source: 2014 IEEE International Parallel & Distributed Processing Symposium Workshops; 2014, p489-496, 8p
-
11
Authors: et al.
Source: 2012 IEEE 11th International Conference on Trust, Security & Privacy in Computing & Communications; 1/ 1/2012, p1370-1375, 6p
-
12
Authors:
Source: Security & Communication Networks; May2015, Vol. 8 Issue 7, p1237-1255, 19p
-
13
Authors: BEDA, Bogdan
Source: Journal of Mobile, Embedded & Distributed Systems; 2015, Vol. 7 Issue 2, p54-59, 6p
Subject Terms: WEB-based user interfaces, SECURITY management, INTERNET access, COMPUTER hackers, COMPUTER security
-
14
-
15
Authors: Yehia Elghaly
Resource Type: eBook.
Categories: COMPUTERS / Languages / Python, COMPUTERS / Operating Systems / Windows Server, COMPUTERS / Programming / General
-
16
-
17
Authors: MacLean
Resource Type: eBook.
Categories: COMPUTERS / Data Science / Data Visualization, COMPUTERS / Data Science / General, TECHNOLOGY & ENGINEERING / Biomedical
-
18
Authors: et al.
Resource Type: eBook.
Categories: COMPUTERS / Business & Productivity Software / General, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Networking / General, COMPUTERS / Security / General
-
19
Authors: Yehia Elghaly
Resource Type: eBook.
Categories: COMPUTERS / Languages / Python, COMPUTERS / Software Development & Engineering / Quality Assurance & Testing
-
20
Authors:
Resource Type: eBook.
Subjects: Computer security
Categories: COMPUTERS / Data Science / General, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Security / General, SOCIAL SCIENCE / Criminology, TECHNOLOGY & ENGINEERING / Engineering (General)
Nájsť tento článok vo Web of Science
Full Text Finder