Search Results - Vulnerable JavaScript
-
1
Authors: Abdullah Sheneamer
Source: PeerJ Computer Science, Vol 10, p e1838 (2024)
Subject Terms: Vulnerable Javascript functions detection, Code security, Security of web applications, JavaScript engine vulnerability, Cross-site scripting detection, Stacking convolutional neural networks (CNNs), Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
2
Authors: et al.
-
3
Authors:
Source: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. :917-930
-
4
Authors: et al.
Source: 2019 IEEE/ACM 7th International Workshop on Realizing Artificial Intelligence Synergies in Software Engineering (RAISE). :8-14
Subject Terms: Software Engineering (cs.SE), FOS: Computer and information sciences, Computer Science - Software Engineering, Computer Science - Cryptography and Security, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 15. Life on land, 16. Peace & justice, Cryptography and Security (cs.CR), 3. Good health
File Description: text
Access URL: http://arxiv.org/abs/2405.07213
-
5
Authors: et al.
Source: Proceedings of the 2011 International Symposium on Software Testing and Analysis. :177-187
-
6
Authors: et al.
Source: 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER).
-
7
Authors:
Source: ACM Transactions on Privacy & Security; Feb2024, Vol. 27 Issue 1, p1-37, 37p
-
8
Authors: et al.
Source: IEICE Transactions on Information and Systems. 2022, E105.D(1):19
-
9
Authors:
Contributors:
-
10
Authors:
-
11
Authors:
Source: Companion Proceedings of the ACM Web Conference 2024. :666-669
Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2403.13193
-
12
Authors:
Source: Технічна інженерія, Vol 1, Iss 93, Pp 201-210 (2024)
Subject Terms: javascript, response mechanisms, monitoring, web security, real-time threat detection, Engineering (General). Civil engineering (General), TA1-2040
File Description: electronic resource
-
13
Authors: et al.
Source: Nutrients. Jun2025, Vol. 17 Issue 11, p1823. 16p.
HTML Full Text PDF Full Text -
14
Authors: et al.
Source: Future Internet. Aug2022, Vol. 14 Issue 8, p217-N.PAG. 15p.
-
15
Authors: Sanguino, Tomás de J. Mateo1 (AUTHOR)
Source: Information. Jan2026, Vol. 17 Issue 1, p98. 25p.
Subject Terms: *Malware, Social engineering (Fraud), Field research, Language models, Internet security, Employment interviewing
-
16
Authors:
Source: 8th International Conference on Information Systems Security and Privacy (ICISSP), Online International Conference on Information Systems Security and Privacy. 1:528-535
Subject Terms: Browser Extensions, Web Privacy, Web Security
File Description: electronic
-
17
Authors: Tomás de J. Mateo Sanguino
Source: Information, Vol 17, Iss 1, p 98 (2026)
Subject Terms: social engineering, technical job interviews, malicious code detection, obfuscated JavaScript, AI-assisted cybersecurity, crypto wallet compromise, Information technology, T58.5-58.64
File Description: electronic resource
-
18
Authors: et al.
Source: ICSE: International Conference on Software Engineering; 2023, p1059-1070, 12p
Subject Terms: COMPUTER security, BENCHMARKING (Management), CLIENT/SERVER computing, JAVASCRIPT programming language, COMPUTER users
-
19
Authors: et al.
Source: Cybersecurity (2523-3246); 1/4/2026, Vol. 9 Issue 1, p1-12, 12p
-
20
Authors:
Source: Journal of Management Information Systems; 2025, Vol. 42 Issue 4, p1149-1176, 28p
Full Text Finder
Nájsť tento článok vo Web of Science