Wang, 2016
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Do Xuan et al. | Malicious URL detection based on machine learning | |
| Catak et al. | A benchmark API call dataset for windows PE malware classification | |
| Hong et al. | Phishing url detection with lexical features and blacklisted domains | |
| Iqbal et al. | The ad wars: retrospective measurement and analysis of anti-adblock filter lists | |
| US9596255B2 (en) | Honey monkey network exploration | |
| Wang et al. | Jsdc: A hybrid approach for javascript malware detection and classification | |
| Chen et al. | WebPatrol: Automated collection and replay of web-based malware scenarios | |
| Song et al. | Mab-malware: A reinforcement learning framework for attacking static malware classifiers | |
| Bahtiyar et al. | A multi-dimensional machine learning approach to predict advanced malware | |
| Kim et al. | WebMon: ML-and YARA-based malicious webpage detection | |
| De Maio et al. | Pexy: The other side of exploit kits | |
| Akhtar | Malware detection and analysis: Challenges and research opportunities | |
| Sanchez-Rola et al. | Knockin’on trackers’ door: Large-scale automatic analysis of web tracking | |
| Li et al. | Shellbreaker: Automatically detecting php-based malicious web shells | |
| Toffalini et al. | Google dorks: Analysis, creation, and new defenses | |
| Hannousse et al. | A deep learner model for multi-language webshell detection | |
| Gorji et al. | Detecting obfuscated JavaScript malware using sequences of internal function calls | |
| Suryati et al. | Impact analysis of malware based on call network API with heuristic detection method | |
| Chaudhary et al. | Plague of cross-site scripting on web applications: a review, taxonomy and challenges | |
| Sajid et al. | SymbSODA: configurable and verifiable orchestration automation for active malware deception | |
| Canfora et al. | A set of features to detect web security threats | |
| Altaf et al. | Vulnerability assessment and patching management | |
| Priya et al. | A static approach to detect drive-by-download attacks on webpages | |
| Gupta et al. | Developing a blockchain-based and distributed database-oriented multi-malware detection engine | |
| Ibrahim et al. | Detection and analysis of drive-by downloads and malicious websites |