5   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Xinglu He, Pengfei Wang, Kai Lu and Xu Zhou    
A multi-priority scheduling path exploration technology based on abstract syntax tree analysis.
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Muhammad Fakhrur Rozi, Seiichi Ozawa, Tao Ban, Sangwook Kim, Takeshi Takahashi and Daisuke Inoue    
JavaScript-based attacks injected into a webpage to perpetrate malicious activities are still the main problem in web security. Recent works have leveraged advances in artificial intelligence by considering many feature representations to improve the per... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
KyungHyun Han and Seong Oun Hwang    
Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed. In particular, the redirection JavaScript in the landing site is obfuscated to avoid detection ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Cong Pan, Minyan Lu, Biao Xu and Houleng Gao    
To improve software reliability, software defect prediction is used to find software bugs and prioritize testing efforts. Recently, some researchers introduced deep learning models, such as the deep belief network (DBN) and the state-of-the-art convoluti... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xiaobo Tan, Yingjie Xu, Tong Wu and Bohan Li    
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these me... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »