共 50 条
- [21] Cujo: Efficient Detection and Prevention of Drive-by-Download Attacks 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 31 - 39
- [23] Similarity Analysis of Shellcodes in Drive-by Download Attack Kits PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 687 - 694
- [24] The MALICIA dataset: identification and analysis of drive-by download operations International Journal of Information Security, 2015, 14 : 15 - 33
- [25] DDIML: Explainable detection model for drive-by-download attacks Journal of Intelligent and Fuzzy Systems, 2022, 43 (03): : 3429 - 3442
- [27] MARMITE: Spreading Malicious File Reputation Through Download Graphs 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 91 - 102
- [29] ON DRIVE-BY-DOWNLOAD ATTACKS AND MALWARE CLASSIFICATION PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 13), 2013, : 217 - 225
- [30] An Approach to Detect Drive-by Download by Observing the Web Page Transition Behaviors 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 19 - 25