Search Results - JavaScript libraries detection~
-
1
Authors: et al.
Source: 2023 46th MIPRO ICT and Electronics Convention (MIPRO). :1246-1251
Subject Terms: vulnerabilities, cybersecurity, Croatian web space, JavaScript libraries detection
-
2
Authors: et al.
Source: 2023 46th MIPRO ICT and Electronics Convention (MIPRO). :1240-1245
Subject Terms: JavaScript, cybersecurity, version detection, Croatian web space
-
3
Authors: et al.
Source: Proceedings of the ACM on Software Engineering. 2:2340-2361
-
4
Authors: et al.
Source: 2023 46th MIPRO ICT and Electronics Convention (MIPRO). :1252-1257
Subject Terms: JavaScript, cybersecurity, minification, automated detection, Croatian web space, obfuscation
-
5
Authors: et al.
Contributors: et al.
Source: Lecture Notes in Computer Science ISBN: 9789819780150
Subject Terms: Constant Time, Automated detection, Cryptography, Vulnerabilities, Side channels, Instrumentation, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
File Description: application/pdf
Access URL: https://hal.science/hal-04652991v1
-
6
Authors:
Source: ICSE: International Conference on Software Engineering; 5/22/2021, p74-85, 12p
Subject Terms: JAVASCRIPT programming language, SOFTWARE libraries (Computer programming), ARTIFICIAL intelligence, SOFTWARE engineering, COMPUTER software development
-
7
Authors:
Source: Communications of the ACM; Jun2018, Vol. 61 Issue 6, p41-47, 7p, 2 Diagrams, 3 Charts
-
8
Authors: et al.
Contributors: et al.
Source: CANS 2024 - 23rd International Conference on Cryptology And Network Security ; https://hal.science/hal-04652991 ; CANS 2024 - 23rd International Conference on Cryptology And Network Security, Sep 2024, Cambridge, United Kingdom. pp.1-22 ; https://2024.cansconference.org/home
Subject Terms: Side channels, Vulnerabilities, Cryptography, Automated detection, Instrumentation, Constant Time, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Subject Geographic: Cambridge, United Kingdom
Relation: https://archive.softwareheritage.org/swh:1:dir:16a8e3ee83ea9470bf4568aeeb618a99dbe70f40; https://archive.softwareheritage.org/swh:1:snp:67e8b5da60d46399055c2ebda9b6f251cf2fc0c1; https://archive.softwareheritage.org/swh:1:rev:5afba8f7aba37bf3c51662ef0dacb8410466a076; https://archive.softwareheritage.org/swh:1:dir:0737b27feede652d8256e58de0bc4688b98ff96a; https://archive.softwareheritage.org/swh:1:snp:2e30bd48a1ef7e7dcb0976d44d69f31531a44b00; https://archive.softwareheritage.org/swh:1:rev:543b51766d26e0753ec2f11e7bbb988733db26c3
-
9
Authors:
Contributors:
Subject Terms: JavaScript libraries, web vulnerabilities, TECHNICAL SCIENCES. Computing, TEHNIČKE ZNANOSTI. Računarstvo, detekcija ranjivosti, vulnerability detection, ranjivosti weba, JavaScript biblioteke
File Description: application/pdf
-
10
Authors:
Source: Proceedings of the 28th Annual ACM Symposium on User Interface Software & Technology. :270-279
-
11
Authors: et al.
Source: Computers & Security. Jun2025, Vol. 153, pN.PAG-N.PAG. 1p.
Subject Terms: *WEBSITES, *ALGORITHMS, *MALWARE, DEEP learning, LEARNING ability, SYNTAX (Grammar)
-
12
Authors:
Contributors:
Subject Terms: obfuskacija, minifikacija, maliciozan kod, JavaScript, kibernetička sigurnost, obfuscation, minification, malicious code, cyber security, TEHNIČKE ZNANOSTI. Računarstvo, TECHNICAL SCIENCES. Computing
File Description: application/pdf
Relation: https://zir.nsk.hr/islandora/object/fer:9799; https://urn.nsk.hr/urn:nbn:hr:168:742990; https://repozitorij.unizg.hr/islandora/object/fer:9799; https://repozitorij.unizg.hr/islandora/object/fer:9799/datastream/PDF
-
13
Authors:
Contributors:
Subject Terms: ranjivosti weba, JavaScript biblioteke, detekcija ranjivosti, web vulnerabilities, JavaScript libraries, vulnerability detection, TEHNIČKE ZNANOSTI. Računarstvo, TECHNICAL SCIENCES. Computing
File Description: application/pdf
Relation: https://zir.nsk.hr/islandora/object/fer:10453; https://urn.nsk.hr/urn:nbn:hr:168:193540; https://repozitorij.unizg.hr/islandora/object/fer:10453; https://repozitorij.unizg.hr/islandora/object/fer:10453/datastream/PDF
-
14
-
15
Authors:
Source: ACM Queue; Jan/Feb2018, Vol. 16 Issue 1, p1-21, 21p
Subject Terms: SECURITY systems, CONFERENCES & conventions
-
16
-
17
Authors:
Source: Journal of Applied Mathematics, Statistics & Informatics; Dec2024, Vol. 20 Issue 2, p77-110, 34p
-
18
Authors:
Source: Diagnostics (2075-4418); Feb2026, Vol. 16 Issue 4, p585, 12p
-
19
Authors:
Source: Cuestiones de Fisioterapia; 2025, Vol. 54 Issue 4, p259-272, 14p
Subject Terms: COMPUTER networks, INTERNET security, MACHINE learning, WIRELESS Internet, SECURITY systems
-
20
Authors:
Thesis Advisors:
File Description: 100
Availability: http://ndltd.ncl.edu.tw/handle/39116325376819709114
Nájsť tento článok vo Web of Science
Full Text Finder