Search Results - malicious JavaScripts
-
1
-
2
Authors:
Source: Journal of Information Processing. 2024, 32:748-756
-
3
Authors: et al.
Source: Future Internet. Aug2022, Vol. 14 Issue 8, p217-N.PAG. 15p.
-
4
Authors:
Source: e-Informatica Software Engineering Journal, Vol 8, Iss 1, Pp 65-78 (2015)
Subject Terms: malicious JavaScripts, Computer software, QA76.75-76.765
File Description: electronic resource
-
5
Authors: et al.
Index Terms: Cyber security, Malicious JavaScript, Abstract syntax tree, Graph neural network, Conference Paper., AM.
-
6
Authors: et al.
Source: IEEE Access, Vol 11, Pp 102727-102745 (2023)
Subject Terms: Abstract syntax tree, cyber security, graph neural network, malicious JavaScript detection, source code representation, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
7
Authors: et al.
Source: Future Internet, Vol 14, Iss 8, p 217 (2022)
Subject Terms: malware detection, intrusion detection, obfuscated malicious, machine learning, malicious JavaScript, Information technology, T58.5-58.64
File Description: electronic resource
-
8
Source: Jisuanji kexue, Vol 51, Iss 7, Pp 389-396 (2024)
Subject Terms: malicious documents, javascript code, indicator extraction, symbolic execution, code rewriting, constraint solving optimization, Computer software, QA76.75-76.765, Technology (General), T1-995
File Description: electronic resource
-
9
Authors: et al.
Source: IEEE Access, Vol 6, Pp 59118-59125 (2018)
Subject Terms: JavaScript, malicious code detection, bytecode, word vector, LSTM, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
10
Authors:
Source: CAAI Transactions on Intelligence Technology (2020)
Subject Terms: invasive software, java, internet, feature extraction, text analysis, vectors, learning (artificial intelligence), formatted js code, deobfuscation methods, unpacking, dud-preprocessed obfuscated malicious js codes, term frequency–inverse document frequency model, long short-term memory model, paragraph vector models, obfuscated benign js codes, learned feature vectors, fasttext model, js code editor, multilayer obfuscation, original js code, undetectable code, obscure code, machine learning models detection, Computational linguistics. Natural language processing, P98-98.5, Computer software, QA76.75-76.765
File Description: electronic resource
-
11
Authors: et al.
Source: PLoS ONE. 12/14/2022, Vol. 17 Issue 12, p1-27. 27p.
Subject Terms: *DEEP learning, *JAVASCRIPT programming language, *LINEAR network coding, *FEATURE extraction, *DATA mining, *INFORMATION modeling, *SYNTAX (Grammar)
-
12
Authors: et al.
Source: Applied Sciences, Vol 10, Iss 10, p 3440 (2020)
Subject Terms: cyber security, malware detection, program slice, deep learning, malicious JavaScript, Bidirectional LSTM, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
File Description: electronic resource
-
13
Authors: et al.
Source: IEEE Access, Vol 6, Pp 12284-12294 (2018)
Subject Terms: JavaScript application, hybrid mobile app, behavior anomaly detection, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
14
Authors: et al.
Source: Proceedings of 2014 International Conference on Modelling, Identification & Control. :351-354
-
15
Malicious PDF Detection Model against Adversarial Attack Built from Benign PDF Containing JavaScript
Authors: et al.
Source: Applied Sciences, Vol 9, Iss 22, p 4764 (2019)
Subject Terms: malicious pdf, malware, detection, machine-learning, adversarial attack, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
File Description: electronic resource
-
16
Authors: et al.
Contributors: et al.
Source: e-Informatica Software Engineering Journal, Vol 8, Iss 1, Pp 65-78 (2015)
Subject Terms: QA76.75-76.765, malicious web pages, JavaScript, security, static analysis, machine learning, 0202 electrical engineering, electronic engineering, information engineering, informatyka - czasopisma, Computer software, 02 engineering and technology, malicious JavaScripts, 3. Good health
File Description: application/pdf
-
17
Authors: et al.
Source: Computers & Security. Jun2025, Vol. 153, pN.PAG-N.PAG. 1p.
Subject Terms: *WEBSITES, *ALGORITHMS, *MALWARE, DEEP learning, LEARNING ability, SYNTAX (Grammar)
-
18
Authors:
Source: Безопасность информационных технологий, Vol 17, Iss 1, Pp 115-117 (2010)
Subject Terms: malicious code detection, behavior analysis, behavior signature, Information technology, T58.5-58.64, Information theory, Q350-390
File Description: electronic resource
-
19
Authors: et al.
Source: Communications in Computer and Information Science ISBN: 9789811027376
-
20
Nájsť tento článok vo Web of Science
Full Text Finder