The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase drive-by-download (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2007-2012 (15) 2013-2015 (17) 2016-2022 (12)
Publication types (Num. hits)
article(15) inproceedings(28) phdthesis(1)
Venues (Conferences, Journals, ...)
AsiaJCIS(3) ACSAC(2) CollaborateCom(2) CoRR(2) DIMVA(2) RAID(2) ACISP(1) ACM Trans. Web(1) AISC(1) AsiaCCS(1) COMPSAC(1) CoNEXT Student Workshop(1) FICTA (2)(1) HCI (16)(1) ICADIWT(1) ICCCS(1) More (+10 of total 36)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 13 occurrences of 9 keywords

Results
Found 44 publication records. Showing 44 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
89Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye Preventing drive-by download via inter-module communication monitoring. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF inter-module communication, malicious script, intrusion detection, ActiveX, drive-by download
71Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee BLADE: Slashing the Invisible Channel of Drive-by Download Malware. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
62Marco Cova, Christopher Krügel, Giovanni Vigna Detection and analysis of drive-by-download attacks and malicious JavaScript code. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF drive-by-download attacks, web client exploits, anomaly detection
55Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious script, shellcode, emulation, Drive-by download
39Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. Search on Bibsonomy HCI (16) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks
36Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF web-based malware, blacklist, drive-by-download
36Chia-Mei Chen, Wan-Yi Tsai, Hsiao-Chung Lin Anomaly Behavior Analysis for Web Page Inspection. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious webpage, Anomaly behavior, Drive-by download
27Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch Measurement Study on Malicious Web Servers in the .nz Domain. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Xiaole Liu, Cheng Huang 0003, Yong Fang 0002 DDIML: Explainable detection model for drive-by-download attacks. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Amir Javed, Ruth Ikwu, Pete Burnap, Luca Giommoni, Matthew L. Williams Disrupting drive-by download networks on Twitter. Search on Bibsonomy Soc. Netw. Anal. Min. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Amir Javed, Pete Burnap, Matthew L. Williams, Omer F. Rana Emotions Behind Drive-by Download Propagation on Twitter. Search on Bibsonomy ACM Trans. Web The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Amir Javed, Pete Burnap, Omer F. Rana Prediction of drive-by download attacks on Twitter. Search on Bibsonomy Inf. Process. Manag. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Mohit Singhal, David Levine Analysis and Categorization of Drive-by Download Malware. Search on Bibsonomy ICCCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Monther Aldwairi, Musaab Hasan, Zayed Balbahaith Detection of Drive-by Download Attacks Using Machine Learning Approach. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Amir Javed, Pete Burnap, Omer F. Rana Real Time Prediction of Drive by Download Attacks on Twitter. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
26Mohammad Puttaroo A behavioural study in runtime analysis environments and drive-by download attacks. Search on Bibsonomy 2017   RDF
26Aditya K. Sood, Sherali Zeadally Drive-By Download Attacks: A Comparative Study. Search on Bibsonomy IT Prof. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Sang-Yong Choi, Daehyeok Kim, Yongmin Kim ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks. Search on Bibsonomy J. Inf. Process. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Prabaharan Poornachandran, S. Praveen, Aravind Ashok, Manu R. Krishnan, K. P. Soman Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines. Search on Bibsonomy FICTA (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Antonio Nappa, M. Zubair Rafique, Juan Caballero The MALICIA dataset: identification and analysis of drive-by download operations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Alfredo De Santis, Giancarlo De Maio, Umberto Ferraro Petrillo Using HTML5 to Prevent Detection of Drive-by-Download Web Malware. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
26Alfredo De Santis, Giancarlo De Maio, Umberto Ferraro Petrillo Using HTML5 to prevent detection of drive-by-download web malware. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Tetsuji Takada, Katsuhiro Amako A Visual Approach to Detecting Drive-by Download Attacks. Search on Bibsonomy VINCI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks. Search on Bibsonomy COMPSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Hiroaki Kikuchi, Hiroaki Matsumoto, Hiroshi Ishii 0002 Automated Detection of Drive-By Download Attack. Search on Bibsonomy IMIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Takashi Adachi, Kazumasa Omote An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode. Search on Bibsonomy AsiaJCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Gaya K. Jayasinghe, J. Shane Culpepper, Peter Bertók Efficient and effective realtime prediction of drive-by download attacks. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26K. Ravi Kishore, M. Mallesh, G. Jyostna, P. R. Lakshmi Eswari, Samavedam Satyanadha Sarma Browser JS Guard: Detects and defends against Malicious JavaScript injection based drive by download attacks. Search on Bibsonomy ICADIWT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Yasutaka Shindo, Akihiro Satoh, Yutaka Nakamura, Katsuyoshi Iida Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition. Search on Bibsonomy CoNEXT Student Workshop The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo Measuring Drive-by Download Defense in Depth. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin Detection of plugin misuse drive-by download attacks using kernel machines. Search on Bibsonomy CollaborateCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Yinzhi Cao, Xiang Pan, Yan Chen 0004, Jianwei Zhuge JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Takashi Matsunaka, Ayumu Kubota, Takahiro Kasama An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors. Search on Bibsonomy AsiaJCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk Anatomy of Drive-by Download Attack. Search on Bibsonomy AISC The full citation details ... 2013 DBLP  BibTeX  RDF
26Antonio Nappa, M. Zubair Rafique, Juan Caballero Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting. Search on Bibsonomy DIMVA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Takashi Matsunaka, Junpei Urakawa, Ayumu Kubota Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web. Search on Bibsonomy AsiaJCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin Similarity analysis of shellcodes in drive-by download attack kits. Search on Bibsonomy CollaborateCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Fu-Hau Hsu, Chang-Kuo Tso, Yi-Chun Yeh, Wei-Jen Wang, Li-Han Chen BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Mitsuaki Akiyama, Makoto Iwamura, Yuhei Kawakoya, Kazufumi Aoki, Mitsutaka Itoh Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Konrad Rieck, Tammo Krueger, Andreas Dewald Cujo: efficient detection and prevention of drive-by-download attacks. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Manuel Egele, Engin Kirda, Christopher Kruegel Mitigating Drive-By Download Attacks: Challenges and Open Problems. Search on Bibsonomy iNetSeC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Christian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky Identification of malicious web pages through analysis of underlying DNS and web server relationships. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Ming-Wei Wu, Sy-Yen Kuo Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #44 of 44 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license