|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 22 occurrences of 18 keywords
|
|
|
Results
Found 17 publication records. Showing 17 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
52 | Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda |
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
malicious script, shellcode, emulation, Drive-by download |
44 | Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee |
BLADE: Slashing the Invisible Channel of Drive-by Download Malware. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
43 | Andreas Dewald, Thorsten Holz, Felix C. Freiling |
ADSandbox: sandboxing JavaScript to fight malicious websites. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
dynamic analysis, malicious software, drive-by downloads |
43 | Peishun Liu, Xuefang Wang |
Identification of Malicious Web Pages by Inductive Learning. |
WISM |
2009 |
DBLP DOI BibTeX RDF |
Malicious detection, generalization, specialization, inductive learning, drive-by downloads |
43 | Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval |
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. |
HCI (16) |
2009 |
DBLP DOI BibTeX RDF |
counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks |
43 | Anne M. Payton |
A review of spyware campaigns and strategies to combat them. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware |
39 | Ismail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Cheng-Seen Ho, Kuo-Ping Wu, Shyi-Ming Chen |
Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction. |
TrustCom/BigDataSE/ISPA (1) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi |
Detection and Analysis of Drive-by Downloads and Malicious Websites. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
30 | Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi |
Detection and Analysis of Drive-by Downloads and Malicious Websites. |
SSCC |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Haibo Zhang, Chaoshun Zuo, Shanqing Guo, Lizhen Cui, Jun Chen |
SafeBrowsingCloud: Detecting Drive-by-Downloads Attack Using Cloud Computing Environment. |
IOV |
2014 |
DBLP DOI BibTeX RDF |
|
30 | Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk |
Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand. |
LCN |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Junjie Zhang 0004, Christian Seifert, Jack W. Stokes, Wenke Lee |
ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads. |
WWW |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Julia Narvaez, Barbara Endicott-Popovsky, Christian Seifert, Chiraag Uday Aval, Deborah A. Frincke |
Drive-by-Downloads. |
HICSS |
2010 |
DBLP DOI BibTeX RDF |
|
30 | David Harley, Pierre-Marc Bureau |
Drive-by downloads from the trenches. |
MALWARE |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Marco Cova, Christopher Krügel, Giovanni Vigna |
Detection and analysis of drive-by-download attacks and malicious JavaScript code. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
drive-by-download attacks, web client exploits, anomaly detection |
16 | Peter Likarish, Eunjin Jung |
A targeted web crawling for building malicious javascript collection. |
CIKM-DSMM |
2009 |
DBLP DOI BibTeX RDF |
malicious javascript, security, web crawling |
16 | Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras |
ALICE@home: Distributed Framework for Detecting Malicious Sites. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #17 of 17 (100 per page; Change: )
|
|