Author:
Ibrahim Saeed,Herami Nawwaf Al,Naqbi Ebrahim Al,Aldwairi Monther
Reference33 articles.
1. Adachi, T., Omote, K.: An approach to predict drive-by-download attacks by vulnerability evaluation and opcode. In: 2015 10th Asia Joint Conference on Information Security (AsiaJCIS), pp. 145–151. IEEE (2015).
https://doi.org/10.1109/AsiaJCIS.2015.17
2. Al-Taharwa, I.A., Lee, H.M., Jeng, A.B., Ho, C.S., Wu, K.P., Chen, S.M.: Drive-by disclosure: a large-scale detector of drive-by downloads based on latent behavior prediction. In: 2015 IEEE Trustcom/BigDataSE/ISPA, vol. 1, pp. 334–343. IEEE (2015).
https://doi.org/10.1109/Trustcom.2015.392
3. Aldwairi, M., Guled, M., Cassada, M., Pratt, M., Stevenson, D., Franzon, P.: Switch architecture for optical burst switching networks. In: Proceedings of the First Workshop on Optical Burst Switching, OPTICOMM 2003, October 2003
4. Aldwairi, M., Alsalman, R.: MALURLs: Malicious URLs classification system. In: Annual International Conference on Information Theory and Applications (2011).
https://doi.org/10.5176/978-981-08-8113-9_ITA2011-29
5. Aldwairi, M., Alsalman, R.: MALURLs: a lightweight malicious website classification based on URL features. J. Emerg. Technol. Web Intell. 4(2), 128–133 (2012).
https://doi.org/10.4304/jetwi.4.2.128-133
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献