Empirical analysis of impact of HTTP referer on malicious website behaviour and delivery
Referer is a HTTP header field transmitted to a webserver, which allows the webserver to
identify the origin of the request and the path taken by the visiting user to reach the final …
identify the origin of the request and the path taken by the visiting user to reach the final …
A novel scoring model to detect potential malicious web pages
Malicious web pages have embedded within them active contents that exploit vulnerabilities
in users' browsers and plug-ins in order to compromise the users' machines. Approaches …
in users' browsers and plug-ins in order to compromise the users' machines. Approaches …
DeMalfier: Detection of malicious Web pages using an effective classifier
The web has become an indispensable global platform that glues together daily
communication, sharing, trading, collaboration and service delivery. Web users often store …
communication, sharing, trading, collaboration and service delivery. Web users often store …
Activity stream based interaction
JM Van Rotterdam, G Frankel - US Patent 12,131,294, 2024 - Google Patents
An activity stream based interaction model and systems implementing such a model are
disclosed. In various embodiments, a text-based tag is recognized in a received …
disclosed. In various embodiments, a text-based tag is recognized in a received …
Zararlı web sayfalarının tespiti ve sınıflandırılması için yeni bir sistem önerisi
C Kadi - 2018 - acikbilim.yok.gov.tr
Gün geçtikçe değişen ve büyüyen web teknolojileri, kullanıcıların bunlara olan ilgisinin
artmasını fırsat bilen saldırganlar tarafından hedef haline gelmiştir. Kullanıcılar web sayfaları …
artmasını fırsat bilen saldırganlar tarafından hedef haline gelmiştir. Kullanıcılar web sayfaları …
Technical identifiers of fraudulent web pages, a systematic literature review
I Orive Múgica - 2020 - diva-portal.org
Fraudulent pages are a danger to which all web users are exposed. These pages have
illegitimate purposes such as the theft of sensitive user information. There are a lot of tools …
illegitimate purposes such as the theft of sensitive user information. There are a lot of tools …
Security privilege escalation exploit detection and mitigation
A Sandoval, E Klonowski - US Patent 12,149,623, 2024 - Google Patents
Examples of the present disclosure describe systems and methods for monitoring the
security privileges of a process. In aspects, when a process is created, the corresponding …
security privileges of a process. In aspects, when a process is created, the corresponding …
Proactive browser content analysis
J Jaroch, HM McCloy III, RE Adams - US Patent 11,593,484, 2023 - Google Patents
(57) ABSTRACT A protection module operates to analyze threats, at the protocol level (eg, at
the HTML level), by intercepting all requests that a browser engine resident in a computing …
the HTML level), by intercepting all requests that a browser engine resident in a computing …
A Comprehensive Evaluation of Feature-Based Malicious Website Detection
JF McGahagan IV - 2020 - search.proquest.com
Although the internet enables many important functions of modern life, it is also a ground for
nefarious activity by malicious actors and cybercriminals. For example, malicious websites …
nefarious activity by malicious actors and cybercriminals. For example, malicious websites …
[PDF][PDF] FEATURE-BASED APPROACHES TO DETECT DRIVE-BY DOWNLOAD ATTACKS
LE VAN LAM - ecs.wgtn.ac.nz
Malicious web pages contain malicious code that can exploit a visitor's computer system.
When a visitor visits a malicious web page, it exploits vulnerabilities on the visitor's computer …
When a visitor visits a malicious web page, it exploits vulnerabilities on the visitor's computer …