Search Results - Malicious JavaScript code detection
-
1
Authors:
Source: 2018 25th Asia-Pacific Software Engineering Conference (APSEC). :365-374
Subject Terms: 13. Climate action, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 7. Clean energy
-
2
Authors: et al.
Source: Future Internet. Aug2022, Vol. 14 Issue 8, p217-N.PAG. 15p.
-
3
Authors:
Source: Безопасность информационных технологий, Vol 17, Iss 1, Pp 115-117 (2010)
Subject Terms: malicious code detection, behavior analysis, behavior signature, Information technology, T58.5-58.64, Information theory, Q350-390
File Description: electronic resource
-
4
Authors: et al.
Source: Future Internet, Vol 14, Iss 8, p 217 (2022)
Subject Terms: malware detection, intrusion detection, obfuscated malicious, machine learning, malicious JavaScript, Information technology, T58.5-58.64
File Description: electronic resource
-
5
Authors: et al.
Source: IEEE Access, Vol 11, Pp 102727-102745 (2023)
Subject Terms: Abstract syntax tree, cyber security, graph neural network, malicious JavaScript detection, source code representation, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
6
Authors: et al.
Source: JUCS-Journal of Universal Computer Science 21(3): 369-383
Subject Terms: conceptual graph, 0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, malicious code detection, APT attack defence, 01 natural sciences
File Description: text/html
Access URL: http://www.jucs.org/jucs_21_3/polymorphic_malicious_javascript_code/jucs_21_03_0369_0383_choi.pdf
https://www.jucs.org/jucs_21_3/polymorphic_malicious_javascript_code/jucs_21_03_0369_0383_choi.pdf
http://www.jucs.org/doi?doi=10.3217/jucs-021-03-0369
https://dblp.uni-trier.de/db/journals/jucs/jucs21.html#ChoiCYK15
https://lib.jucs.org/article/23035
https://lib.jucs.org/article/23035/download/pdf/
https://lib.jucs.org/article/23035/
https://lib.jucs.org/article/23035/download/pdf/
https://doi.org/10.3217/jucs-021-03-0369 -
7
Authors: et al.
Source: IEEE Access, Vol 6, Pp 59118-59125 (2018)
Subject Terms: JavaScript, malicious code detection, bytecode, word vector, LSTM, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
8
Authors: et al.
Source: PloS one [PLoS One] 2022 Dec 14; Vol. 17 (12), pp. e0277891. Date of Electronic Publication: 2022 Dec 14 (Print Publication: 2022).
Publication Type: Journal Article; Research Support, Non-U.S. Gov't
Journal Info: Publisher: Public Library of Science Country of Publication: United States NLM ID: 101285081 Publication Model: eCollection Cited Medium: Internet ISSN: 1932-6203 (Electronic) Linking ISSN: 19326203 NLM ISO Abbreviation: PLoS One Subsets: MEDLINE
MeSH Terms: Algorithms* , Computer Security*
-
9
-
10
Authors:
Source: e-Informatica Software Engineering Journal, Vol 8, Iss 1, Pp 65-78 (2015)
Subject Terms: malicious JavaScripts, Computer software, QA76.75-76.765
File Description: electronic resource
-
11
Authors:
Source: CAAI Transactions on Intelligence Technology (2020)
Subject Terms: invasive software, java, internet, feature extraction, text analysis, vectors, learning (artificial intelligence), formatted js code, deobfuscation methods, unpacking, dud-preprocessed obfuscated malicious js codes, term frequency–inverse document frequency model, long short-term memory model, paragraph vector models, obfuscated benign js codes, learned feature vectors, fasttext model, js code editor, multilayer obfuscation, original js code, undetectable code, obscure code, machine learning models detection, Computational linguistics. Natural language processing, P98-98.5, Computer software, QA76.75-76.765
File Description: electronic resource
-
12
Authors:
Source: IEEE Access, Vol 8, Pp 190539-190552 (2020)
Subject Terms: Cybersecurity, systematic literature review, malicious code detection, javascript attacks, javascript malware detection, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
13
Source: Jisuanji kexue, Vol 51, Iss 7, Pp 389-396 (2024)
Subject Terms: malicious documents, javascript code, indicator extraction, symbolic execution, code rewriting, constraint solving optimization, Computer software, QA76.75-76.765, Technology (General), T1-995
File Description: electronic resource
-
14
Authors:
Source: 2012 7th International Conference on Malicious & Unwanted Software; 1/ 1/2012, p9-16, 8p
-
15
Malicious PDF Detection Model against Adversarial Attack Built from Benign PDF Containing JavaScript
Authors: et al.
Source: Applied Sciences, Vol 9, Iss 22, p 4764 (2019)
Subject Terms: malicious pdf, malware, detection, machine-learning, adversarial attack, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
File Description: electronic resource
-
16
Authors: Gu, Boxuan
Subject Terms: Computer Science, intrusion detection, malicious code detection, web security, javascript security, smartphone security, android security, information flow tracking, information leaking, worm detection, shellcode, shellcode detection
Availability: http://rave.ohiolink.edu/etdc/view?acc_num=osu1354523604
-
17
Authors: et al.
Source: Information Security Journal: A Global Perspective; 2012, Vol. 21 Issue 1, p1-11, 11p
Subject Terms: JAVASCRIPT programming language, MALWARE, SCRIPTING languages (Computer science), WEBSITES, PHISHING
-
18
Authors:
Source: Security & Communication Networks; 7/25/2016, Vol. 9 Issue 11, p1520-1534, 15p
-
19
Authors:
Source: PIK - Praxis der Informationsverarbeitung und Kommunikation; 2012, Vol. 35 Issue 1, p54-60, 7p, 6 Diagrams, 4 Charts
Subject Terms: JAVASCRIPT programming language, SUPPORT vector machines, APPLICATION software, MALWARE, INSTRUCTIONAL systems, COMPUTER architecture, WEBSITES, INFORMATION technology
Reviews & Products: DATA Security & Privacy Law: Combating Cyberthreats (Book)
-
20
Authors:
Source: KSII Transactions on Internet & Information Systems. Feb2012, Vol. 6 Issue 2, p766-783. 18p. 6 Diagrams, 4 Charts, 1 Graph.
Nájsť tento článok vo Web of Science
Full Text Finder