-
1
-
-
84873447654
-
Prophiler: A fast filter for the large-scale detection of malicious web pages
-
D. Canali, M. Cova, G. Vigna, and C. Kruegel, "Prophiler: a fast filter for the large-scale detection of malicious web pages," in Proceedings of the 20th international conference on World wide web, 2011, pp. 197-206.
-
(2011)
Proceedings of the 20th International Conference on World Wide Web
, pp. 197-206
-
-
Canali, D.1
Cova, M.2
Vigna, G.3
Kruegel, C.4
-
2
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious urls
-
J. Ma, S. L. K., S. Stefan, and V. G. M., "Beyond blacklists: learning to detect malicious web sites from suspicious urls," in Proceedings of the 15th international conference on Knowledge discovery and data mining, 2009, pp. 1245-1254.
-
(2009)
Proceedings of the 15th International Conference on Knowledge Discovery and Data Mining
, pp. 1245-1254
-
-
Ma, J.1
K, S.L.2
Stefan, S.3
M, V.G.4
-
3
-
-
79551627398
-
Detecting malicious web servers with honeyclients
-
M. Qassrawi and H. Zhang, "Detecting malicious web servers with honeyclients," Journal of Networks, vol. 6, no. 1, 2011.
-
(2011)
Journal of Networks
, vol.6
, Issue.1
-
-
Qassrawi, M.1
Zhang, H.2
-
4
-
-
77954717029
-
Adsandbox: Sandboxing javascript to fight malicious websites
-
A. Dewald, T. Holz, and F. C. Freiling, "Adsandbox: sandboxing javascript to fight malicious websites," in ACM Symposium on Applied Computing, 2010, pp. 1859-1864.
-
(2010)
ACM Symposium on Applied Computing
, pp. 1859-1864
-
-
Dewald, A.1
Holz, T.2
Freiling, F.C.3
-
6
-
-
80052334271
-
Vex: Vetting browser extensions for security vulnerabilities
-
B. S., K. S.T., M. P., and W M.
-
B. S., K. S.T., M. P., and W. M., "Vex: vetting browser extensions for security vulnerabilities," in Proceedings of the 19th USENIX conference on Security, 2010, pp. 22-22.
-
(2010)
Proceedings of the 19th USENIX Conference on Security
, pp. 22-22
-
-
-
7
-
-
71149108237
-
Identifying suspicious urls: An application of large-scale online learning
-
ser. ICML '09
-
M. Justin, S. L. K., S. Stefan, and V. G. M., "Identifying suspicious urls: an application of large-scale online learning," in Proceedings of the 26th Annual International Conference on Machine Learning, ser. ICML '09, 2009, pp. 681-688.
-
(2009)
Proceedings of the 26th Annual International Conference on Machine Learning
, pp. 681-688
-
-
Justin, M.1
K, S.L.2
Stefan, S.3
M, V.G.4
-
8
-
-
70349437016
-
Malicious web content detection by machine learning
-
H. Yung-Tsung, C. Yimeng, C. Tsuhan, L. Chi-Sung, and C. Chia-Mei, "Malicious web content detection by machine learning," Expert Syst. Appl., vol. 37, pp. 55-60, 2010.
-
(2010)
Expert Syst. Appl.
, vol.37
, pp. 55-60
-
-
Yung-Tsung, H.1
Yimeng, C.2
Tsuhan, C.3
Chi-Sung, L.4
Chia-Mei, C.5
-
10
-
-
77954566293
-
Detection and analysis of drive-by-download attacks and malicious javascript code
-
C. Marco, K. Christopher, and V. Giovanni, "Detection and analysis of drive-by-download attacks and malicious javascript code," in Proceedings of the 19th international conference on World wide web, 2010, pp. 281-290.
-
(2010)
Proceedings of the 19th International Conference on World Wide Web
, pp. 281-290
-
-
Marco, C.1
Christopher, K.2
Giovanni, V.3
-
11
-
-
56649105534
-
Spyproxy: Execution-based detection of malicious web content
-
M. Alexander, B. Tanya, D. Damien, G. S. D., and L. H. M., "Spyproxy: execution-based detection of malicious web content," in Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, 2007, pp. 3:1-3:16.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
, vol.1-3
, Issue.16
, pp. 3
-
-
Alexander, M.1
Tanya, B.2
Damien, D.3
D, G.S.4
M, L.H.5
-
12
-
-
77950809482
-
Analyzing and detecting malicious flash advertisements
-
S. Ford, M. Cova, C. Kruegel, and G. Vigna, "Analyzing and Detecting Malicious Flash Advertisements," in Proceedings of the Annual Computer Security Applications Conference, 2009.
-
(2009)
Proceedings of the Annual Computer Security Applications Conference
-
-
Ford, S.1
Cova, M.2
Kruegel, C.3
Vigna, G.4
-
13
-
-
84874268174
-
Monkey-spider: Detecting malicious websites with low-interaction honeyclients
-
A. Ikinci, T. Holz, and F. Freiling, "Monkey-spider: Detecting malicious websites with low-interaction honeyclients," in Proceedings of Sicherheit, Schutz und ZuverlLssigkeit, 2008, pp. 407-421.
-
(2008)
Proceedings of Sicherheit Schutz und ZuverlLssigkeit
, pp. 407-421
-
-
Ikinci, A.1
Holz, T.2
Freiling, F.3
-
14
-
-
84871547671
-
Suspicious malicious web site detection with strength analysis of a javascript obfuscation
-
B.-I. K., C.-T. I., and H.-C. J.
-
B.-I. K., C.-T. I., and H.-C. J., "Suspicious malicious web site detection with strength analysis of a javascript obfuscation," in International Journal of Advanced Science and Technology, 2011, pp. 19-32.
-
(2011)
International Journal of Advanced Science and Technology
, pp. 19-32
-
-
-
15
-
-
78751553658
-
Cujo: Efficient detection and prevention of drive-by-download attacks
-
R. K., K. T., and D. A.
-
R. K., K. T., and D. A., "Cujo: efficient detection and prevention of drive-by-download attacks." in Proceedings of the 26th Annual Computer Security Applications Conference, 2010, pp. 31-39.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 31-39
-
-
-
17
-
-
83755209113
-
-
PhD Dissertation: University of California, San Diego
-
J. T. Ma, "Learning to detect malicious urls." in PhD Dissertation: University of California, San Diego, 2010.
-
(2010)
Learning to Detect Malicious Urls
-
-
Ma, J.T.1
|