نتایج جستجو برای: malicious web pages

تعداد نتایج: 255955  

Journal: :مدیریت اطلاعات سلامت 0
فرزانه امین پور دانشجوی دکترا، مدیریت اطلاعات بهداشتی، دانشگاه علوم پزشکی ایران، عضو مرکز تحقیقات آموزش پزشکی دانشگاه علوم پزشکی اصفهان، اصفهان زهرا اطرج کارشناس، کتابداری و اطلاع رسانی پزشکی، دانشگاه علوم پزشکی اصفهان، اصفهان

normal 0 false false false en-us x-none ar-sa microsoftinternetexplorer4 introduction: some of the most frequently used webometric indicators for evaluating and ranking academic web sites are web impact factor, number of web pages and number of inlinks. the present study evaluated and ranked top iranian medical universities according to the webometric indicators. methods: the present cross-sect...

2013
Van Lam Le Ian Welch Xiaoying Gao Peter Komisarczuk

Drive-by download attacks where web browsers are subverted by malicious content delivered by web servers have become a common attack vector in recent years. Several methods for the detection of malicious content on web pages using data mining techniques to classify web pages as malicious or benign have been proposed in the literature. However, each proposed method uses different content feature...

Journal: :Journal of Computer Security 2014
Joe Gibbs Politz Arjun Guha Shriram Krishnamurthi

Web pages routinely incorporate JavaScript code from third-party sources. However, all code in a page runs in the same security context, regardless of provenance. When Web pages incorporate third-party JavaScript without any checks, as many do, they open themselves to attack. A third-party can trivially inject malicious JavaScript into such a page, causing all manner of harm. Several such attac...

2014
Alexandros Kapravelos Chris Grier Neha Chachra Christopher Krügel Giovanni Vigna Vern Paxson

We present Hulk, a dynamic analysis system that detects malicious behavior in browser extensions by monitoring their execution and corresponding network activity. Hulk elicits malicious behavior in extensions in two ways. First, Hulk leverages HoneyPages, which are dynamic pages that adapt to an extension’s expectations in web page structure and content. Second, Hulk employs a fuzzer to drive t...

2015
Terry Nelms Roberto Perdisci Manos Antonakakis Mustaque Ahamad

Most modern malware download attacks occur via the browser, typically due to social engineering and driveby downloads. In this paper, we study the “origin” of malware download attacks experienced by real network users, with the objective of improving malware download defenses. Specifically, we study the web paths followed by users who eventually fall victim to different types of malware downloa...

2012
Yaser Alosefer

With an increase in the use of the internet, there has been a rise in the number of attacks on servers. These attacks can be successfully defended against using security technologies such as firewalls, IDS and anti-virus software, so attackers have developed new methods to spread their malicious code by using web pages, which can affect many more victims than the traditional approach. The attac...

Journal: :IEEE Computer 2004
Neal Leavitt

A recent Internet attack that exploited a powerful new assault technique has computer security officials worried that it could be a har-binger of worse things to come. The attack was based on a Trojan horse—a nonreplicating program that hides malicious code inside apparently harmless programming, data, or Web pages—dubbed JS.Scob.Trojan by antivirus experts. " We have validated a minimum of 630...

2013
A. Duraisamy

Cross-Site scripting attacks occur when accessing information in intermediate trusted sites. Cross-Site Scripting (XSS) is one of the major problems of any Web application. Web browsers are used in the execution of commands in web pages to enable dynamic Web pages attackers to make use of this feature and to enforce the execution of malicious code in a user’s Web browser. This paper describes t...

2008
Charles Reis Steven D. Gribble Tadayoshi Kohno Nicholas C. Weaver

While web pages sent over HTTP have no integrity guarantees, it is commonly assumed that such pages are not modified in transit. In this paper, we provide evidence of surprisingly widespread and diverse changes made to web pages between the server and client. Over 1% of web clients in our study received altered pages, and we show that these changes often have undesirable consequences for web pu...

The response speed of Web pages is one of the necessities of information technology. In recent years, renowned companies such as Google and computer scientists focused on speeding up the web. Achievements such as Google Pagespeed, Nginx and varnish are the result of these researches. In Customer to Customer(C2C) business systems, such as chat systems, and in Business to Customer(B2C) systems, s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید