Search Results - obfuscated JavaScript
-
1
Authors: et al.
Source: ACM Transactions on Software Engineering and Methodology. 34:1-28
-
2
Authors: et al.
Source: 2023 46th MIPRO ICT and Electronics Convention (MIPRO). :1252-1257
Subject Terms: JavaScript, cybersecurity, minification, automated detection, Croatian web space, obfuscation
-
3
Authors: Susana Maria de Sousa Lima
Subject Terms: Engenharia electrotécnica, electrónica e informática, Electrical engineering, Electronic engineering, Information engineering
File Description: application/pdf
Availability: https://hdl.handle.net/10216/135504
-
4
Authors:
Source: 2023 8th International Conference on Smart and Sustainable Technologies (SpliTech). :1-6
-
5
Authors:
Source: Journal of Computer Virology and Hacking Techniques. 19:387-398
-
6
Authors:
Source: Mathematics and Mathematical Modeling. :1-24
Subject Terms: 0102 computer and information sciences, 0101 mathematics, 01 natural sciences
-
7
Authors:
Source: 2019 IEEE Security and Privacy Workshops (SPW). :218-223
-
8
Authors: et al.
Source: Future Internet, Vol 14, Iss 8, p 217 (2022)
Subject Terms: malware detection, intrusion detection, obfuscated malicious, machine learning, malicious JavaScript, Information technology, T58.5-58.64
File Description: electronic resource
-
9
Authors: et al.
Subject Terms: Cryptography and Security, Software Engineering
Relation: http://arxiv.org/abs/2512.14070
-
10
Authors: et al.
Source: Future Internet. Aug2022, Vol. 14 Issue 8, p217-N.PAG. 15p.
-
11
-
12
Authors: et al.
Source: Proceedings of the 2016 ACM International on Workshop on Traffic Measurements for Cybersecurity. :3-11
-
13
Authors: Shewale, Saraunsh
Subject Terms: Electronic computers. Computer science, Machine learning, Computer Security
File Description: application/pdf
Access URL: https://norma.ncirl.ie/7738/
-
14
Authors:
Source: Applied Soft Computing. 137:110138
-
15
Authors:
Source: 2015 The International Symposium on Artificial Intelligence and Signal Processing (AISP). :322-327
-
16
Authors:
Source: Proceedings of the 2014 ACM Southeast Regional Conference. :1-6
-
17
Authors: et al.
Index Terms: Obfuscated JavaScript, Detection, Malicious JavaScript, Machine learning, 006: Spezielle Computerverfahren, Konferenz: Paper, Text
URL:
https://doi.org/10.21256/zhaw-3848
ICIMP 2016 the Eleventh International Conference on Internet Monitoring and Protection : May 22-26, 2016, Valencia, Spain
ICIMP 2016 the Eleventh International Conference on Internet Monitoring and Protection, Valencia, Spain, 22-26 May 2016 -
18
Authors:
Source: 2012 IEEE Sixth International Conference on Software Security and Reliability. :31-40
-
19
Authors: et al.
Source: 2012 26th International Conference on Advanced Information Networking and Applications Workshops. :344-351
-
20
Authors: et al.
Source: Lecture Notes in Computer Science ISBN: 9783319934105
Subject Terms: 3. Good health
Full Text Finder
Nájsť tento článok vo Web of Science