共 50 条
- [31] Securing Java']Java-Based mobile agents through byte code obfuscation techniques [J]. 10TH IEEE INTERNATIONAL MULTITOPIC CONFERENCE 2006, PROCEEDINGS, 2006, : 305 - +
- [32] An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors [J]. ISSTA 2023 - Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023, : 1420 - 1432
- [33] Obfuscated Malicious Java']JavaScript Detection by Machine Learning [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 805 - 810
- [34] HIDENOSEEK: Camouflaging Malicious Java']JavaScript in Benign ASTs [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1899 - 1913
- [36] A Method of Java']JavaScript path obfuscation based on Collatz conjecture [J]. 2015 12TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA), 2015, : 330 - 333
- [38] An Exploratory Study of Analyzing Java']JavaScript Online Code Clones [J]. 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2022), 2022, : 94 - 98
- [39] Js']JsSandbox: A Framework for Analyzing the Behavior of Malicious Java']JavaScript Code using Internal Function Hooking [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (02): : 766 - 783
- [40] Power Based Malicious Code Detection Techniques for Smartphones [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 142 - 149