|
|
|
Xinglu He, Pengfei Wang, Kai Lu and Xu Zhou
A multi-priority scheduling path exploration technology based on abstract syntax tree analysis.
|
|
|
|
|
|
|
Muhammad Fakhrur Rozi, Seiichi Ozawa, Tao Ban, Sangwook Kim, Takeshi Takahashi and Daisuke Inoue
JavaScript-based attacks injected into a webpage to perpetrate malicious activities are still the main problem in web security. Recent works have leveraged advances in artificial intelligence by considering many feature representations to improve the per...
ver más
|
|
|
|
|
|
|
KyungHyun Han and Seong Oun Hwang
Attackers use a variety of techniques to insert redirection JavaScript that leads a user to a malicious webpage, where a drive-by-download attack is executed. In particular, the redirection JavaScript in the landing site is obfuscated to avoid detection ...
ver más
|
|
|
|
|
|
|
Cong Pan, Minyan Lu, Biao Xu and Houleng Gao
To improve software reliability, software defect prediction is used to find software bugs and prioritize testing efforts. Recently, some researchers introduced deep learning models, such as the deep belief network (DBN) and the state-of-the-art convoluti...
ver más
|
|
|
|
|
|
|
Xiaobo Tan, Yingjie Xu, Tong Wu and Bohan Li
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these me...
ver más
|
|
|
|