Khan et al., 2017 - Google Patents
A dynamic method of detecting malicious scripts using classifiersKhan et al., 2017
View PDF- Document ID
- 17892923184864634306
- Author
- Khan N
- Abdullah J
- Khan A
- Publication year
- Publication venue
- Advanced Science Letters
External Links
Snippet
Due to the increasing importance of Internet in every aspect of our life, the World Wide Web which is accessed by end users through web browsers is becoming the next platform for criminal or individual with the malicious intent to conduct malicious activities either for …
- 238000001514 detection method 0 abstract description 32
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240364738A1 (en) | Deep learning for malicious url classification (urlc) with the innocent until proven guilty (iupg) learning framework | |
Vinayakumar et al. | Scalable framework for cyber threat situational awareness based on domain name systems data analysis | |
David et al. | Deepsign: Deep learning for automatic malware signature generation and classification | |
Song et al. | Advanced evasion attacks and mitigations on practical ML‐based phishing website classifiers | |
Aldauiji et al. | Utilizing cyber threat hunting techniques to find ransomware attacks: A survey of the state of the art | |
US8769692B1 (en) | System and method for detecting malware by transforming objects and analyzing different views of objects | |
Kim et al. | Detecting fake anti-virus software distribution webpages | |
Kaur et al. | Automatic attack signature generation systems: A review | |
Nissim et al. | Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework | |
Sirageldin et al. | Malicious web page detection: A machine learning approach | |
Akhtar | Malware detection and analysis: Challenges and research opportunities | |
KR20210084204A (en) | Malware Crawling Method and System | |
Hwang et al. | Semi-supervised based unknown attack detection in EDR environment | |
Akram et al. | A systematic literature review: usage of logistic regression for malware detection | |
Khan et al. | A dynamic method of detecting malicious scripts using classifiers | |
US20230164180A1 (en) | Phishing detection methods and systems | |
Omopintemi et al. | Machine learning for malware detection in network traffic | |
Mehrban et al. | Ransomware threat mitigation through network traffic analysis and machine learning techniques | |
Moawad et al. | An automatic artificial intelligence system for malware detection | |
Chowdhury et al. | Malware detection for healthcare data security | |
Bhatt et al. | Machine learning-based security mechanism for detecting phishing attacks | |
Hiremath | A novel approach for analyzing and classifying malicious web pages | |
Bozogullarindan et al. | Detection of Turkish fraudulent domain names to proactively prevent phishing attacks using a character-level convolutional neural network | |
James et al. | Malware attacks: A survey on mitigation measures | |
Anusha et al. | Investigation on malware detection using deep learning methods for sustainable development |