Search Results - malicious JavaScript detection
-
1
Authors: et al.
Source: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783032023612
-
2
Authors:
Source: International Journal of Network Security & Its Applications. 13:11-21
-
3
Authors:
Source: Journal of Information Processing. 32:748-756
-
4
Breaking Obfuscation: Cluster-Aware Graph with LLM-Aided Recovery for Malicious JavaScript Detection
Authors: et al.
Subject Terms: Machine Learning, FOS: Computer and information sciences, Cryptography and Security, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Access URL: http://arxiv.org/abs/2507.22447
-
5
Authors: et al.
Source: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :327-338
-
6
-
7
Authors: et al.
Source: Computers & Security. 153:104390
-
8
Authors: et al.
Source: IEEE Access, Vol 11, Pp 102727-102745 (2023)
-
9
Authors: et al.
Source: IEEE Access, Vol 6, Pp 59118-59125 (2018)
-
10
Authors:
Source: International Journal of Intelligent Systems. 36:7153-7176
-
11
Authors:
Source: Proceedings of the 35th Annual Computer Security Applications Conference. :257-269
-
12
Authors:
Source: 2020 International Joint Conference on Neural Networks (IJCNN). :1-8
-
13
Authors:
Source: International Journal of Open Source Software and Processes. 11:46-59
-
14
Authors:
Source: Lecture Notes in Computer Science ISBN: 9783031330162
-
15
Source: International Journal of Innovative Technology and Exploring Engineering. 9:794-797
-
16
Authors: et al.
Source: MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM). :1-8
Subject Terms: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
-
17
Authors: et al.
Source: Future Internet. Aug2022, Vol. 14 Issue 8, p217-N.PAG. 15p.
-
18
Authors: et al.
Source: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319788128
Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Forced execution, Information Security, 02 engineering and technology, Malicious javascript, False positive and false negatives, Design and implementations, 0202 electrical engineering, electronic engineering, information engineering, Detection rates, Dynamic analysis techniques, Execution engine, Analysis techniques, Cryptography and Security (cs.CR)
File Description: application/pdf
-
19
Authors: et al.
Source: 2018 International Joint Conference on Neural Networks (IJCNN). :1-8
-
20
Authors: Zhenyuan Guo
Source: Advances in Intelligent Systems and Computing ISBN: 9783030627423
Nájsť tento článok vo Web of Science
Full Text Finder