Search Results - JavaScript Obfuscation*
-
1
Authors: João Vitor Freitas Fernandes
Subject Terms: Engenharia electrotécnica, electrónica e informática, Electrical engineering, Electronic engineering, Information engineering
File Description: application/pdf
Availability: https://hdl.handle.net/10216/152115
-
2
Breaking Obfuscation: Cluster-Aware Graph with LLM-Aided Recovery for Malicious JavaScript Detection
Authors: et al.
Subject Terms: Machine Learning, FOS: Computer and information sciences, Cryptography and Security, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Access URL: http://arxiv.org/abs/2507.22447
-
3
Authors: et al.
Source: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. :1420-1432
-
4
Authors: et al.
Source: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :339-351
-
5
Authors:
Source: Proceedings of the ACM Internet Measurement Conference. :648-661
-
6
Authors: et al.
Source: 2023 46th MIPRO ICT and Electronics Convention (MIPRO). :1252-1257
Subject Terms: JavaScript, cybersecurity, minification, automated detection, Croatian web space, obfuscation
-
7
Authors:
Source: SoftwareX, Vol 31, Iss , Pp 102301- (2025)
Subject Terms: Web security, Dynamic analysis, Sandbox, Obfuscation, Chromium, JavaScript, Computer software, QA76.75-76.765
File Description: electronic resource
-
8
Authors: et al.
Source: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
-
9
Authors:
Source: Communications in Computer and Information Science ISBN: 9789811995811
-
10
Authors:
Source: Proceedings of the 12th International Conference on Availability, Reliability and Security. :1-13
-
11
Authors: et al.
Source: Procedia Computer Science. 207:867-876
Subject Terms: JavaScript, web, cybercrime, code obfuscation, code deobfuscation, control flow flattening, reverse engineering, e-commerce, user tracking, fingerprinting, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
File Description: application/pdf
-
12
Authors: et al.
Source: 2015 12th Web Information System and Application Conference (WISA). :330-333
-
13
-
14
Authors: et al.
Source: Security and Communication Networks. 8:1092-1107
-
15
Authors: et al.
Source: ACM Transactions on Software Engineering & Methodology; Sep2025, Vol. 34 Issue 7, p1-28, 28p
Subject Terms: JAVASCRIPT programming language, MALWARE
-
16
Authors:
Source: 2012 7th International Conference on Malicious and Unwanted Software. :9-16
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 3. Good health
Access URL: http://www.cse.psu.edu/~szhu/papers/malware.pdf
-
17
Authors: et al.
Source: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. :1370-1375
-
18
Authors:
Source: Applied Mechanics and Materials. :391-394
-
19
Authors: et al.
Source: ACM Transactions on Software Engineering & Methodology; Jul2025, Vol. 34 Issue 6, p1-28, 28p
-
20
Additional Titles: Comparison between data obfuscation techniques in a javascript application
Authors: Jarenmark, Rasmus
Nájsť tento článok vo Web of Science
Full Text Finder