Search Results - JavaScript malicious code*
-
1
Authors:
Source: Proceedings of the 2025 5th International Conference on Automation Control, Algorithm and Intelligent Bionics. :344-349
-
2
-
3
-
4
-
5
-
6
Authors: et al.
Source: PLoS ONE, Vol 17, Iss 12, p e0277891 (2022)
File Description: electronic resource
Relation: https://doaj.org/toc/1932-6203
-
7
Authors: et al.
Source: IEEE Access, Vol 11, Pp 102727-102745 (2023)
Subject Terms: Abstract syntax tree, cyber security, graph neural network, malicious JavaScript detection, source code representation, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
8
Authors: et al.
Source: Future Internet, Vol 14, Iss 8, p 217 (2022)
Subject Terms: malware detection, intrusion detection, obfuscated malicious, machine learning, malicious JavaScript, Information technology, T58.5-58.64
File Description: electronic resource
-
9
Authors: et al.
Source: Future Internet. Aug2022, Vol. 14 Issue 8, p217-N.PAG. 15p.
-
10
Source: Jisuanji kexue, Vol 51, Iss 7, Pp 389-396 (2024)
Subject Terms: malicious documents, javascript code, indicator extraction, symbolic execution, code rewriting, constraint solving optimization, Computer software, QA76.75-76.765, Technology (General), T1-995
File Description: electronic resource
-
11
-
12
-
13
-
14
-
15
Authors: et al.
Source: 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. :513-519
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 16. Peace & justice
-
16
-
17
-
18
Authors: et al.
Source: IEEE Access, Vol 6, Pp 59118-59125 (2018)
Subject Terms: JavaScript, malicious code detection, bytecode, word vector, LSTM, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
19
Authors:
Source: Безопасность информационных технологий, Vol 17, Iss 1, Pp 115-117 (2010)
Subject Terms: malicious code detection, behavior analysis, behavior signature, Information technology, T58.5-58.64, Information theory, Q350-390
File Description: electronic resource
-
20
Authors: et al.
Source: PLoS ONE; 12/14/2022, Vol. 17 Issue 12, p1-27, 27p
Nájsť tento článok vo Web of Science
Full Text Finder