The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase drive-by-downloads (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2006-2015 (15) 2019-2020 (2)
Publication types (Num. hits)
article(1) inproceedings(16)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 22 occurrences of 18 keywords

Results
Found 17 publication records. Showing 17 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
52Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious script, shellcode, emulation, Drive-by download
44Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wenke Lee BLADE: Slashing the Invisible Channel of Drive-by Download Malware. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Andreas Dewald, Thorsten Holz, Felix C. Freiling ADSandbox: sandboxing JavaScript to fight malicious websites. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dynamic analysis, malicious software, drive-by downloads
43Peishun Liu, Xuefang Wang Identification of Malicious Web Pages by Inductive Learning. Search on Bibsonomy WISM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious detection, generalization, specialization, inductive learning, drive-by downloads
43Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. Search on Bibsonomy HCI (16) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks
43Anne M. Payton A review of spyware campaigns and strategies to combat them. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware
39Ismail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Cheng-Seen Ho, Kuo-Ping Wu, Shyi-Ming Chen Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction. Search on Bibsonomy TrustCom/BigDataSE/ISPA (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi Detection and Analysis of Drive-by Downloads and Malicious Websites. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
30Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi Detection and Analysis of Drive-by Downloads and Malicious Websites. Search on Bibsonomy SSCC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
30Haibo Zhang, Chaoshun Zuo, Shanqing Guo, Lizhen Cui, Jun Chen SafeBrowsingCloud: Detecting Drive-by-Downloads Attack Using Cloud Computing Environment. Search on Bibsonomy IOV The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand. Search on Bibsonomy LCN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
30Junjie Zhang 0004, Christian Seifert, Jack W. Stokes, Wenke Lee ARROW: GenerAting SignatuRes to Detect DRive-By DOWnloads. Search on Bibsonomy WWW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
30Julia Narvaez, Barbara Endicott-Popovsky, Christian Seifert, Chiraag Uday Aval, Deborah A. Frincke Drive-by-Downloads. Search on Bibsonomy HICSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
30David Harley, Pierre-Marc Bureau Drive-by downloads from the trenches. Search on Bibsonomy MALWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Marco Cova, Christopher Krügel, Giovanni Vigna Detection and analysis of drive-by-download attacks and malicious JavaScript code. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF drive-by-download attacks, web client exploits, anomaly detection
16Peter Likarish, Eunjin Jung A targeted web crawling for building malicious javascript collection. Search on Bibsonomy CIKM-DSMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious javascript, security, web crawling
16Ikpeme Erete, Vinod Yegneswaran, Phillip A. Porras ALICE@home: Distributed Framework for Detecting Malicious Sites. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #17 of 17 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license