|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 13 occurrences of 9 keywords
|
|
|
Results
Found 44 publication records. Showing 44 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
89 | Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye |
Preventing drive-by download via inter-module communication monitoring. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
inter-module communication, malicious script, intrusion detection, ActiveX, drive-by download |
71 | Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee |
BLADE: Slashing the Invisible Channel of Drive-by Download Malware. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
62 | Marco Cova, Christopher Krügel, Giovanni Vigna |
Detection and analysis of drive-by-download attacks and malicious JavaScript code. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
drive-by-download attacks, web client exploits, anomaly detection |
55 | Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda |
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
malicious script, shellcode, emulation, Drive-by download |
39 | Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval |
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. |
HCI (16) |
2009 |
DBLP DOI BibTeX RDF |
counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks |
36 | Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh |
Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
web-based malware, blacklist, drive-by-download |
36 | Chia-Mei Chen, Wan-Yi Tsai, Hsiao-Chung Lin |
Anomaly Behavior Analysis for Web Page Inspection. |
NetCoM |
2009 |
DBLP DOI BibTeX RDF |
Malicious webpage, Anomaly behavior, Drive-by download |
27 | Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch |
Measurement Study on Malicious Web Servers in the .nz Domain. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Xiaole Liu, Cheng Huang 0003, Yong Fang 0002 |
DDIML: Explainable detection model for drive-by-download attacks. |
J. Intell. Fuzzy Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Amir Javed, Ruth Ikwu, Pete Burnap, Luca Giommoni, Matthew L. Williams |
Disrupting drive-by download networks on Twitter. |
Soc. Netw. Anal. Min. |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Amir Javed, Pete Burnap, Matthew L. Williams, Omer F. Rana |
Emotions Behind Drive-by Download Propagation on Twitter. |
ACM Trans. Web |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Amir Javed, Pete Burnap, Omer F. Rana |
Prediction of drive-by download attacks on Twitter. |
Inf. Process. Manag. |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Mohit Singhal, David Levine |
Analysis and Categorization of Drive-by Download Malware. |
ICCCS |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Monther Aldwairi, Musaab Hasan, Zayed Balbahaith |
Detection of Drive-by Download Attacks Using Machine Learning Approach. |
Int. J. Inf. Secur. Priv. |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Amir Javed, Pete Burnap, Omer F. Rana |
Real Time Prediction of Drive by Download Attacks on Twitter. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
26 | Mohammad Puttaroo |
A behavioural study in runtime analysis environments and drive-by download attacks. |
|
2017 |
RDF |
|
26 | Aditya K. Sood, Sherali Zeadally |
Drive-By Download Attacks: A Comparative Study. |
IT Prof. |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto |
MineSpider: Extracting Hidden URLs Behind Evasive Drive-by Download Attacks. |
IEICE Trans. Inf. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Sang-Yong Choi, Daehyeok Kim, Yongmin Kim |
ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks. |
J. Inf. Process. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Prabaharan Poornachandran, S. Praveen, Aravind Ashok, Manu R. Krishnan, K. P. Soman |
Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines. |
FICTA (2) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Antonio Nappa, M. Zubair Rafique, Juan Caballero |
The MALICIA dataset: identification and analysis of drive-by download operations. |
Int. J. Inf. Sec. |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Alfredo De Santis, Giancarlo De Maio, Umberto Ferraro Petrillo |
Using HTML5 to Prevent Detection of Drive-by-Download Web Malware. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
26 | Alfredo De Santis, Giancarlo De Maio, Umberto Ferraro Petrillo |
Using HTML5 to prevent detection of drive-by-download web malware. |
Secur. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Tetsuji Takada, Katsuhiro Amako |
A Visual Approach to Detecting Drive-by Download Attacks. |
VINCI |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Shigeki Goto |
MineSpider: Extracting URLs from Environment-Dependent Drive-by Download Attacks. |
COMPSAC |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Hiroaki Kikuchi, Hiroaki Matsumoto, Hiroshi Ishii 0002 |
Automated Detection of Drive-By Download Attack. |
IMIS |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Takashi Adachi, Kazumasa Omote |
An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode. |
AsiaJCIS |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Gaya K. Jayasinghe, J. Shane Culpepper, Peter Bertók |
Efficient and effective realtime prediction of drive-by download attacks. |
J. Netw. Comput. Appl. |
2014 |
DBLP DOI BibTeX RDF |
|
26 | K. Ravi Kishore, M. Mallesh, G. Jyostna, P. R. Lakshmi Eswari, Samavedam Satyanadha Sarma |
Browser JS Guard: Detects and defends against Malicious JavaScript injection based drive by download attacks. |
ICADIWT |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Yasutaka Shindo, Akihiro Satoh, Yutaka Nakamura, Katsuyoshi Iida |
Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition. |
CoNEXT Student Workshop |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo |
Measuring Drive-by Download Defense in Depth. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin |
Detection of plugin misuse drive-by download attacks using kernel machines. |
CollaborateCom |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Yinzhi Cao, Xiang Pan, Yan Chen 0004, Jianwei Zhuge |
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Takashi Matsunaka, Ayumu Kubota, Takahiro Kasama |
An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors. |
AsiaJCIS |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk |
Anatomy of Drive-by Download Attack. |
AISC |
2013 |
DBLP BibTeX RDF |
|
26 | Antonio Nappa, M. Zubair Rafique, Juan Caballero |
Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting. |
DIMVA |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Takashi Matsunaka, Junpei Urakawa, Ayumu Kubota |
Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web. |
AsiaJCIS |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin |
Similarity analysis of shellcodes in drive-by download attack kits. |
CollaborateCom |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Fu-Hau Hsu, Chang-Kuo Tso, Yi-Chun Yeh, Wei-Jen Wang, Li-Han Chen |
BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks. |
IEEE J. Sel. Areas Commun. |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Mitsuaki Akiyama, Makoto Iwamura, Yuhei Kawakoya, Kazufumi Aoki, Mitsutaka Itoh |
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks. |
IEICE Trans. Commun. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Konrad Rieck, Tammo Krueger, Andreas Dewald |
Cujo: efficient detection and prevention of drive-by-download attacks. |
ACSAC |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Manuel Egele, Engin Kirda, Christopher Kruegel |
Mitigating Drive-By Download Attacks: Challenges and Open Problems. |
iNetSeC |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Christian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky |
Identification of malicious web pages through analysis of underlying DNS and web server relationships. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Ming-Wei Wu, Sy-Yen Kuo |
Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #44 of 44 (100 per page; Change: )
|
|