Author:
Ismail Muhusina,Alrabaee Saed,Harous Saad,Choo Kim-Kwang Raymond
Publisher
Springer Nature Switzerland
Reference65 articles.
1. Mikheeva, O.I., Gatchin Yuri, A., Savkov, S.V., Khammatova, R.M., et al.: Search methods for abnormal activities of web applications. J. Sci. Tech. Inf. Technol. Mech. Optics 126(2), 233–242 (2020)
2. Holz, T., Marechal, S., Raynal, F.: New threats and attacks on the world wide web. IEEE Secur. Priv. 4(2), 72–75 (2006)
3. Moshchuk, A., Bragin, T., Deville, D., Gribble, S.D., Levy, H.M.: SpyProxy: Execution-based detection of malicious web content. In: USENIX Security Symposium, pp. 1–16 (2007)
4. Tekerek, A.: A novel architecture for web-based attack detection using convolutional neural network. Comput. Secur. 100, 102096 (2021)
5. Huang, Y., Li, T., Zhang, L., Li, B., Liu, X.: JSContana: malicious javascript detection using adaptable context analysis and key feature extraction. Comput. Secur. 104, 102218 (2021)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献