Výsledky vyhledávání - Malicious JavaScript detection
-
1
Breaking Obfuscation: Cluster-Aware Graph with LLM-Aided Recovery for Malicious JavaScript Detection
Autoři: a další
Témata: Machine Learning, FOS: Computer and information sciences, Cryptography and Security, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Přístupová URL adresa: http://arxiv.org/abs/2507.22447
-
2
Autoři:
Zdroj: Journal of Information Processing. 32:748-756
-
3
Autoři:
Zdroj: International Journal of Network Security & Its Applications. 13:11-21
-
4
Autoři: a další
Zdroj: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :327-338
-
5
Autoři: a další
Zdroj: Computers & Security. 153:104390
-
6
Autoři:
Zdroj: International Journal of Distributed Systems and Technologies. 13:1-20
-
7
Autoři: a další
Zdroj: IEEE Access, Vol 6, Pp 59118-59125 (2018)
Témata: JavaScript, 0202 electrical engineering, electronic engineering, information engineering, bytecode, Electrical engineering. Electronics. Nuclear engineering, 02 engineering and technology, malicious code detection, LSTM, word vector, TK1-9971
-
8
Autoři: a další
Zdroj: IEEE Access, Vol 11, Pp 102727-102745 (2023)
Témata: source code representation, cyber security, graph neural network, Abstract syntax tree, Electrical engineering. Electronics. Nuclear engineering, malicious JavaScript detection, TK1-9971
Přístupová URL adresa: https://doaj.org/article/96b921f1abd0426fa01fe22f24802029
-
9
Autoři:
Zdroj: International Journal of Intelligent Systems. 36:7153-7176
Témata: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Přístupová URL adresa: https://onlinelibrary.wiley.com/doi/10.1002/int.22584
-
10
Autoři:
Zdroj: Lecture Notes in Computer Science ISBN: 9783031330162
-
11
Autoři:
Zdroj: Proceedings of the 35th Annual Computer Security Applications Conference. :257-269
-
12
Autoři:
Zdroj: 2020 International Joint Conference on Neural Networks (IJCNN). :1-8
Témata: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
13
Autoři:
Zdroj: International Journal of Open Source Software and Processes. 11:46-59
Přístupová URL adresa: https://www.igi-global.com/article/adaptive-spider-bird-swarm-algorithm-based-deep-recurrent-neural-network-for-
malicious -javascript -detection -using-box-cox-transformation/270895
https://doi.org/10.4018/IJOSSP.2020100103
https://dblp.uni-trier.de/db/journals/ijossp/ijossp11.html#AlexR20 -
14
Autoři: a další
Zdroj: Future Internet. Aug2022, Vol. 14 Issue 8, p217-N.PAG. 15p.
-
15
Zdroj: International Journal of Innovative Technology and Exploring Engineering. 9:794-797
-
16
Autoři: a další
Zdroj: MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM). :1-8
Témata: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Přístupová URL adresa: http://arxiv.org/pdf/1904.01126
http://arxiv.org/abs/1904.01126
https://arxiv.org/pdf/1904.01126.pdf
https://ui.adsabs.harvard.edu/abs/2019arXiv190401126S/abstract
https://arxiv.org/abs/1904.01126
https://dblp.uni-trier.de/db/journals/corr/corr1904.html#abs-1904-01126
https://www.microsoft.com/en-us/research/publication/scriptnet-neural-static-analysis-for-malicious -javascript -detection / -
17
Autoři: a další
Zdroj: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319788128
Témata: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Forced execution, Information Security, 02 engineering and technology, Malicious javascript, False positive and false negatives, Design and implementations, 0202 electrical engineering, electronic engineering, information engineering, Detection rates, Dynamic analysis techniques, Execution engine, Analysis techniques, Cryptography and Security (cs.CR)
Popis souboru: application/pdf
Přístupová URL adresa: http://arxiv.org/pdf/1701.07860
http://arxiv.org/abs/1701.07860
https://dblp.uni-trier.de/db/journals/corr/corr1701.html#HuCDHY17
https://link.springer.com/content/pdf/10.1007%2F978-3-319-78813-5_37.pdf
http://ui.adsabs.harvard.edu/abs/2017arXiv170107860H/abstract
https://rd.springer.com/chapter/10.1007/978-3-319-78813-5_37
https://arxiv.org/abs/1701.07860
https://link.springer.com/chapter/10.1007/978-3-319-78813-5_37 -
18
Autoři: a další
Zdroj: Lecture Notes in Computer Science ISBN: 9783030922696
-
19
Autoři: a další
Témata: Cyber security, Malicious JavaScript, Abstract syntax tree, Graph neural network, Conference Paper., AM.
-
20
Autoři: a další
Zdroj: 2018 International Joint Conference on Neural Networks (IJCNN). :1-8
Témata: 13. Climate action, 11. Sustainability, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Nájsť tento článok vo Web of Science
Full Text Finder