Search Results - Malicious JavaScript detection*
-
1
Authors: et al.
Source: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783032023612
-
2
Authors:
Source: International Journal of Network Security & Its Applications. 13:11-21
-
3
Authors:
Source: Journal of Information Processing. 32:748-756
-
4
Breaking Obfuscation: Cluster-Aware Graph with LLM-Aided Recovery for Malicious JavaScript Detection
Authors: et al.
Subject Terms: Machine Learning, FOS: Computer and information sciences, Cryptography and Security, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Access URL: http://arxiv.org/abs/2507.22447
-
5
Authors: et al.
Source: Lecture Notes in Computer Science ISBN: 9783031757631
-
6
Authors: et al.
Source: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :327-338
-
7
-
8
Authors: et al.
Source: 2023 IEEE 3rd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA). :1075-1079
-
9
Authors:
Source: CAAI Transactions on Intelligence Technology (2020)
Subject Terms: obscure code, obfuscated benign js codes, learned feature vectors, 02 engineering and technology, long short-term memory model, QA76.75-76.765, vectors, js code editor, 0202 electrical engineering, electronic engineering, information engineering, Computer software, fasttext model, feature extraction, unpacking, java, term frequency–inverse document frequency model, original js code, invasive software, text analysis, multilayer obfuscation, machine learning models detection, dud-preprocessed obfuscated malicious js codes, formatted js code, paragraph vector models, Computational linguistics. Natural language processing, learning (artificial intelligence), deobfuscation methods, internet, P98-98.5, undetectable code
-
10
Authors: et al.
Source: Lecture Notes in Computer Science ISBN: 9789819724574
-
11
Authors: et al.
Source: Computers & Security. 153:104390
-
12
Authors: et al.
Source: IEEE Access, Vol 11, Pp 102727-102745 (2023)
-
13
Authors: et al.
Source: IEEE Access, Vol 6, Pp 59118-59125 (2018)
-
14
Authors:
Source: International Journal of Intelligent Systems. 36:7153-7176
-
15
Authors:
Source: Proceedings of the 35th Annual Computer Security Applications Conference. :257-269
-
16
Authors:
Source: 2020 International Joint Conference on Neural Networks (IJCNN). :1-8
-
17
Authors:
Source: International Journal of Open Source Software and Processes. 11:46-59
-
18
Authors:
Source: Lecture Notes in Computer Science ISBN: 9783031330162
-
19
Authors: et al.
Source: Proceedings of the 2015 International Symposium on Software Testing and Analysis. :48-59
Subject Terms: malware detection, L, Programming Languages and Compilers, 0202 electrical engineering, electronic engineering, information engineering, Software Engineering, 02 engineering and technology, malicious JavaScript, behavior modelling, 3. Good health
File Description: application/pdf
Access URL: https://ink.library.smu.edu.sg/sis_research/4953
-
20
Authors: et al.
Source: Future Internet, Vol 14, Iss 8, p 217 (2022)
Subject Terms: malware detection, intrusion detection, obfuscated malicious, machine learning, malicious JavaScript, Information technology, T58.5-58.64
File Description: electronic resource
Nájsť tento článok vo Web of Science
Full Text Finder