A machine learning approach to detection of JavaScript-based attacks using AST features and paragraph vectors
暂无分享,去创建一个
Seiichi Ozawa | Samuel Ndichu | Kazuo Makishima | Sangwook Kim | Takeshi Misu | S. Ozawa | Sangwook P. Kim | Samuel Ndichu | Takeshi Misu | Kazuo Makishima
[1] Natheer Khasawneh,et al. Analysis and Identification of Malicious JavaScript Code , 2012, Inf. Secur. J. A Glob. Perspect..
[2] Sehun Kim,et al. Two-Phase Malicious Web Page Detection Scheme Using Misuse and Anomaly Detection , 2014 .
[3] Xia Feng,et al. Latent Dirichlet allocation (LDA) and topic modeling: models, applications, a survey , 2017, Multimedia Tools and Applications.
[4] Patrice Bellot,et al. Accurate and effective latent concept modeling for ad hoc information retrieval , 2014, Document Numérique.
[5] Jeremiah Grossman,et al. XSS Attacks: Cross Site Scripting Exploits and Defense , 2007 .
[6] YoungHan Choi,et al. Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis , 2009, FGIT.
[7] Yang Liu,et al. JSDC: A Hybrid Approach for JavaScript Malware Detection and Classification , 2015, AsiaCCS.
[8] Wei Xu,et al. The power of obfuscation techniques in malicious JavaScript code: A measurement study , 2012, 2012 7th International Conference on Malicious and Unwanted Software.
[9] Jun Sun,et al. Detection and classification of malicious JavaScript via attack behavior modelling , 2015, ISSTA.
[10] Konrad Rieck,et al. Intelligent Defense against Malicious JavaScript Code , 2012, PIK Prax. Informationsverarbeitung Kommun..
[11] Christopher J. C. Burges,et al. A Tutorial on Support Vector Machines for Pattern Recognition , 1998, Data Mining and Knowledge Discovery.
[12] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[13] In-Chan Choi,et al. Indexing by Latent Dirichlet Allocation and an Ensemble Model , 2013, J. Assoc. Inf. Sci. Technol..
[14] Yao Wang,et al. A deep learning approach for detecting malicious JavaScript code , 2016, Secur. Commun. Networks.
[15] Mitsuaki Akiyama,et al. Empowering Anti-malware Research in Japan by Sharing the MWS Datasets , 2015, J. Inf. Process..
[16] Seong-je Cho,et al. Efficient Detection of Malicious Web Pages Using High-Interaction Client Honeypots , 2012, J. Inf. Sci. Eng..
[17] Mitsuaki Akiyama,et al. Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks , 2010, IEICE Trans. Commun..
[18] 神薗 雅紀,et al. Classification of Hostile Javascript based on Encoding Abstract Syntax Tree , 2012 .
[19] Adnan Shahid Khan,et al. Defending Malicious Script Attacks Using Machine Learning Classifiers , 2017, Wirel. Commun. Mob. Comput..
[20] Brandon Pincombe,et al. Comparison of Human and Latent Semantic Analysis (LSA) Judgements of Pairwise Document Similarities for a News Corpus , 2004 .
[21] Rong Jin,et al. Understanding bag-of-words model: a statistical framework , 2010, Int. J. Mach. Learn. Cybern..