Search Results - Malicious JavaScript
-
1
Authors: et al.
Source: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783032023612
-
2
-
3
Authors: et al.
Source: IEEE Access, Vol 11, Pp 102727-102745 (2023)
-
4
Authors:
Source: International Journal of Network Security & Its Applications. 13:11-21
-
5
Breaking Obfuscation: Cluster-Aware Graph with LLM-Aided Recovery for Malicious JavaScript Detection
Authors: et al.
Subject Terms: Machine Learning, FOS: Computer and information sciences, Cryptography and Security, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Access URL: http://arxiv.org/abs/2507.22447
-
6
Authors:
Source: Journal of Information Processing. 32:748-756
-
7
Authors: et al.
Source: Communications in Computer and Information Science ISBN: 9783031752001
-
8
Authors: et al.
Source: Lecture Notes in Computer Science ISBN: 9783031757631
-
9
Authors: et al.
Source: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. :1420-1432
-
10
-
11
Authors: et al.
Source: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :327-338
-
12
Authors: et al.
Source: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :339-351
-
13
Authors: et al.
Source: 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA). :1075-1079
-
14
Authors: et al.
Source: Lecture Notes in Computer Science ISBN: 9789819724574
-
15
Authors:
Source: CAAI Transactions on Intelligence Technology (2020)
Subject Terms: obscure code, obfuscated benign js codes, learned feature vectors, 02 engineering and technology, long short-term memory model, QA76.75-76.765, vectors, js code editor, 0202 electrical engineering, electronic engineering, information engineering, Computer software, fasttext model, feature extraction, unpacking, java, term frequency–inverse document frequency model, original js code, invasive software, text analysis, multilayer obfuscation, machine learning models detection, dud-preprocessed obfuscated malicious js codes, formatted js code, paragraph vector models, Computational linguistics. Natural language processing, learning (artificial intelligence), deobfuscation methods, internet, P98-98.5, undetectable code
-
16
Authors: et al.
Source: Computers & Security. 153:104390
-
17
Authors: et al.
Source: IEEE Access, Vol 6, Pp 59118-59125 (2018)
-
18
Authors:
Source: International Journal of Intelligent Systems. 36:7153-7176
-
19
Authors: et al.
Source: Machine Learning with Applications. 21:100724
-
20
Authors: et al.
Source: Proceedings of the 9th IRC Conference on Science, Engineering, and Technology ISBN: 9789819983681
Subject Terms: System and network security, Software and application security
Nájsť tento článok vo Web of Science
Full Text Finder