Search Results - obfuscated JavaScript*
-
1
Authors: et al.
Source: ACM Transactions on Software Engineering and Methodology. 34:1-28
-
2
-
3
Authors: et al.
Source: 2023 46th MIPRO ICT and Electronics Convention (MIPRO). :1252-1257
Subject Terms: JavaScript, cybersecurity, minification, automated detection, Croatian web space, obfuscation
-
4
Authors: Susana Maria de Sousa Lima
Subject Terms: Engenharia electrotécnica, electrónica e informática, Electrical engineering, Electronic engineering, Information engineering
File Description: application/pdf
Availability: https://hdl.handle.net/10216/135504
-
5
Authors:
Source: 2023 8th International Conference on Smart and Sustainable Technologies (SpliTech). :1-6
-
6
Authors: et al.
Source: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :327-338
-
7
Authors: et al.
Source: Procedia Computer Science. 207:867-876
Subject Terms: JavaScript, web, cybercrime, code obfuscation, code deobfuscation, control flow flattening, reverse engineering, e-commerce, user tracking, fingerprinting, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
File Description: application/pdf
-
8
Authors:
Source: CAAI Transactions on Intelligence Technology (2020)
Subject Terms: obscure code, obfuscated benign js codes, learned feature vectors, 02 engineering and technology, long short-term memory model, QA76.75-76.765, vectors, js code editor, 0202 electrical engineering, electronic engineering, information engineering, Computer software, fasttext model, feature extraction, unpacking, java, term frequency–inverse document frequency model, original js code, invasive software, text analysis, multilayer obfuscation, machine learning models detection, dud-preprocessed obfuscated malicious js codes, formatted js code, paragraph vector models, Computational linguistics. Natural language processing, learning (artificial intelligence), deobfuscation methods, internet, P98-98.5, undetectable code
-
9
Authors:
Source: Journal of Computer Virology and Hacking Techniques. 19:387-398
-
10
Authors:
Source: Mathematics and Mathematical Modeling. :1-24
Subject Terms: 0102 computer and information sciences, 0101 mathematics, 01 natural sciences
-
11
Authors:
Source: 2019 IEEE Security and Privacy Workshops (SPW). :218-223
-
12
Authors: et al.
Source: Future Internet, Vol 14, Iss 8, p 217 (2022)
Subject Terms: malware detection, intrusion detection, obfuscated malicious, machine learning, malicious JavaScript, Information technology, T58.5-58.64
File Description: electronic resource
-
13
Authors: et al.
Subject Terms: Cryptography and Security, Software Engineering
Relation: http://arxiv.org/abs/2512.14070
-
14
Authors: et al.
Source: Future Internet. Aug2022, Vol. 14 Issue 8, p217-N.PAG. 15p.
-
15
Authors: et al.
Source: ACM Transactions on Software Engineering & Methodology; Sep2025, Vol. 34 Issue 7, p1-28, 28p
Subject Terms: JAVASCRIPT programming language, MALWARE
-
16
Authors: et al.
Source: 2017 23rd Asia-Pacific Conference on Communications (APCC). :1-6
-
17
-
18
Authors:
Source: 2017 IEEE 17th International Conference on Communication Technology (ICCT). :1962-1966
-
19
Authors: et al.
Source: Proceedings of the 2016 ACM International on Workshop on Traffic Measurements for Cybersecurity. :3-11
-
20
Authors:
Index Terms: invasive, software, Java, Internet, feature extraction, text analysis, vectors, learning (artificial, intelligence), formatted JS code, deobfuscation methods, unpacking, DUD-preprocessed obfuscated malicious JS codes, term frequency-inverse document frequency model, long short-term memory model, paragraph vector models, obfuscated benign JS codes, learned feature vectors, FastText model, JS code editor, multilayer obfuscation, original JS code, undetectable code, obscure code, machine learning models detection, Journal Article., VoR.
Full Text Finder
Nájsť tento článok vo Web of Science