A Machine Learning Approach to Malicious JavaScript Detection using Fixed Length Vector Representation
暂无分享,去创建一个
Seiichi Ozawa | Samuel Ndichu | Takeshi Misu | Kouichirou Okada | S. Ozawa | Samuel Ndichu | Takeshi Misu | Kouichirou Okada
[1] Mitsuaki Akiyama,et al. Empowering Anti-malware Research in Japan by Sharing the MWS Datasets , 2015, J. Inf. Process..
[2] Seong-je Cho,et al. Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots , 2012, J. Inf. Sci. Eng..
[3] Adnan Shahid Khan,et al. Defending Malicious Script Attacks Using Machine Learning Classifiers , 2017, Wirel. Commun. Mob. Comput..
[4] Olof Mogren,et al. Malicious JavaScript detection using machine learning , 2017 .
[5] Wei Xu,et al. The power of obfuscation techniques in malicious JavaScript code: A measurement study , 2012, 2012 7th International Conference on Malicious and Unwanted Software.
[6] Natheer Khasawneh,et al. Analysis and Identification of Malicious JavaScript Code , 2012, Inf. Secur. J. A Glob. Perspect..
[7] YoungHan Choi,et al. Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis , 2009, FGIT.
[8] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[9] Andrew Y. Ng,et al. Parsing Natural Scenes and Natural Language with Recursive Neural Networks , 2011, ICML.
[10] Marius Kloft,et al. Early detection of malicious behavior in JavaScript code , 2012, AISec '12.
[11] Omer F. Rana,et al. Honeyware: A Web-Based Low Interaction Client Honeypot , 2010, 2010 Third International Conference on Software Testing, Verification, and Validation Workshops.
[12] Mahdi Abadi,et al. Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls , 2014, ACM Southeast Regional Conference.
[13] Konrad Rieck,et al. Intelligent Defense against Malicious JavaScript Code , 2012, PIK Prax. Informationsverarbeitung Kommun..
[14] Wei-Hong Wang,et al. A Static Malicious Javascript Detection Using SVM , 2013 .
[15] Quoc V. Le,et al. Distributed Representations of Sentences and Documents , 2014, ICML.
[16] Yao Wang,et al. A deep learning approach for detecting malicious JavaScript code , 2016, Secur. Commun. Networks.
[17] Christopher Krügel,et al. Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.