![]() |
| CrossRef Text and Data Mining |
| Result of CrossRef Text and Data Mining Search is the related articles with entitled article. If you click link1 or link2 you will be able to reach the full text site of selected articles; however, some links do not show the full text immediately at now. If you click CrossRef Text and Data Mining Download icon, you will be able to get whole list of articles from literature included in CrossRef Text and Data Mining. |
| ELPA: Emulation-Based Linked Page Map Analysis for the Detection of Drive-by Download Attacks |
| Journal of Information Processing Systems. 2016;12(3):422-435. Published online 2015 December 31 DOI: https://doi.org/10.3745/JIPS.03.0045 |
|
Detection and analysis of drive-by-download attacks and malicious JavaScript code Cujo JShield Drive-By Download Attacks: A Comparative Study Lightweight Approach to Detect Drive-by Download Attacks Based on File Type Transition Malicious File Hash Detection and Drive-by Download Attacks Proceedings of the Second International Conference on Computer and Communication Technologies. 2015;661-669 A Visual Approach to Detecting Drive-by Download Attacks Proceedings of the 8th International Symposium on Visual Information Communication and Interaction. 2015;162-163 BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks Geography and genes: zoomable view of frog NCBI classification with linked map Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter |
| This metadata service is kindly provided by CrossRef from May 29, 2014. Journal of Information Processing Systems has participated in CrossRef Text and Data Mining service since February 27, 2015. |