共 50 条
- [1] Detection of Plug in Misuse Drive-By Download Attacks Using Kernel Machines 2014 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2014, : 546 - 553
- [2] Similarity Analysis of Shellcodes in Drive-by Download Attack Kits PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 687 - 694
- [3] Malicious File Hash Detection and Drive-by Download Attacks PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 661 - 669
- [7] A Visual Approach to Detecting Drive-by Download Attacks 8TH INTERNATIONAL SYMPOSIUM ON VISUAL INFORMATION COMMUNICATION AND INTERACTION (VINCI 2015), 2015, : 162 - 163
- [8] Drive-by damage detection in bridges using the apparent profile STRUCTURAL CONTROL & HEALTH MONITORING, 2015, 22 (05): : 813 - 825
- [10] Mitigating Drive-By Download Attacks: Challenges and Open Problems INETSEC 2009 - OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2009, 309 : 52 - +